CN102655526A - Computing technique foundation of intelligent integrated system for coordinative configuration of Internet user terminals - Google Patents

Computing technique foundation of intelligent integrated system for coordinative configuration of Internet user terminals Download PDF

Info

Publication number
CN102655526A
CN102655526A CN2011103416922A CN201110341692A CN102655526A CN 102655526 A CN102655526 A CN 102655526A CN 2011103416922 A CN2011103416922 A CN 2011103416922A CN 201110341692 A CN201110341692 A CN 201110341692A CN 102655526 A CN102655526 A CN 102655526A
Authority
CN
China
Prior art keywords
internet user
configuration
network configuration
hom
logical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011103416922A
Other languages
Chinese (zh)
Inventor
李宗诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2011103416922A priority Critical patent/CN102655526A/en
Publication of CN102655526A publication Critical patent/CN102655526A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a computing technique foundation of an intelligent integrated system for the coordinative configuration of Internet user terminals, which is a new technology established for transforming a 'cloud' computing system into an all-inclusive 'universe' computing system, and implemented through establishing the basic model, normal form and equation system of network configuration dynamics and the basic model, normal form and equation system of holographic organization synergetics on the basis of establishing a bran-new logical foundation, a bran-new mathematical foundation and a bran-new scientific foundation and by centering on Internet users and then centering on multi-level value chain (GVC global value chain), and taking the connection and coordination (performed based on a computer aided system and the Internet) of a cognitive system and a practice system as the principal line of an evolution process of a high-grade intelligent integration system (HIIS).

Description

Configuration intelligent integral system-computed technical foundation is coordinated at the Internet user terminal
Technical field
This invention is the applicant, and formally (generic name is the 298th in " GVC network technology support system [DCN/IIL (VCSE)] " to 600 patent of invention clusters that State Patent Office submits to through electronic system in September, 2011.
(generic name is " GVC network technology support system [DCN/IIL (VCSE) for this invention and patent of invention cluster; ] " in the 281st, the 282nd, the 283rd, the 284th, the 285th, the 286th, the 287th, the 288th, the 289th, the 290th, the 291st, the 292nd, the 293rd, the 294th, the 295th, the 296th, the 297th, the 299th, the 300th, together, constitute patent of invention crowd " Internet user's terminal network configuration ICT technique support system (ICT-NAM/[UEC]) " jointly.
" GVC network technology support system [DCN/IIL (VCSE) that the applicant proposes to comprise this invention, is made up of 600 patents of invention; ] "; its bulking property target is; be the center with Internet user; and then be the center with GVC system (GVC); the connection of carrying out based on computer and network thereof with Natural Intelligence and Artificial Intelligence and coordinate the main line as general intelligence integrated system (GIIS) Upgrade process, sets up brand-new logical foundations, Fundamentals of Mathematics, scientific basic and brand-new technology basis and engineering foundation, for relative closure, static relatively " resource pool "---system for cloud computing injects soul, intelligence and life; build global intelligent integral contract network computer architecture (CS/HSN (GII)), Global Internet is made becomes the technique support system that really has life and ecological holographic joint management character.On this basis; The connection of carrying out based on computer aided system and the Internet with cognitive system and practice system and coordinate the main line as high-grade intelligent integrated system (HIIS) evolution process is set up based on brand-new theoretical intelligent integrated scientific and technical system (the IIS & IIT of metasystem (MS) science; Logistics net, energy net, Network and Finance Network and the knowledge knowledge network of each field all departments combine together with being dispersed in all over the world with the novel Global Internet of life-giving vigor; Carry out the GVC system engineering energetically; Set up the global intelligent integral really have life and ecological holographic joint management character and dynamically converge open network system (DCN/HII (GVC)), thereby build intelligent integrated net, life the Internet and ecological operation net.GVC system engineering technology cluster exploitation total strategy---the inventor is referred to as " since the beginning of history " plan through implementing, and " cloud " counting system that flicker is indefinite is transformed into " world " counting system that converges logical all things on earth, connects longitude and latitude.
The main purpose of this invention is that through brand-new logical foundations, Fundamentals of Mathematics, scientific basic and brand-new technology basis and just system-based, system provides the computing technique basis for Internet user's terminal network configuration intelligent integral.
All related Mathematical Modelings are the inventor and independently set up in this specification, have original innovation property.
This invention belongs to network configuration, planning organization and the planning management field (NA/UEC) at Internet user terminal; Be towards the Internet user terminal and then towards resource distribution, the organization and management technical foundation of Internet user's network configuration system, people, mechanism and tissue guided into from flicker indefinite " cloud " (counting system) converge the key of " world " (brand-new counting system) of logical all things on earth.
NA/UEC is a kind of solution of Internet user's system engineering; By means of the brand-new Information technology and the network technology; Importing Internet user's service strategy and operation mode whole is among the inside and outside related system of Internet user's network configuration of trunk with the information system; It is the just change on the science and technology, but involves Internet user's organization internal comprehensive integration and the configuration all about the flow process on the cross-region of personnel, fund, logistics, manufacturing and Internet user tissue or transnational border related with the outside.  
NA/UEC is physical resources configuration (logistics), human resources configuration (stream of people), fund resource distribution (wealth stream), information resources configuration (information flow) the integrated Internet user's configuration software to the inside and outside association of Internet user's network configuration.Through the DIM that generates the merchant towards the Rule Design merchant of the inside and outside association of Internet user's network configuration, system integrator, module analyze and propose towards the inside and outside related ultimate consumer of Internet user's network configuration, social governor motion, the SHF of relative analyzes both at home and abroad, describes vertical related department of future generation, horizontal related department and value resource planning (VRP) software.It will comprise the inside and outside related user of Internet user's network configuration/service system framework, use graphical user interface, use open system and make.Except the existing standard function, it also comprises other characteristic, like the adjustment report of the quality of the inside and outside association of Internet user's network configuration, process enactment configuration and the inside and outside association of Internet user's network configuration etc.Particularly, thus the basic technology that NA/UEC adopts will be more prone to upgrading will for simultaneously the independence of the inside and outside related user software and hardware of Internet user's network configuration two aspects.The key of NA/UEC be all users of the inside and outside association of Internet user's network configuration can cutting its use, thereby have natural ease for use.
Background technology
NA/UEC can be a kind of instrument that configuration person solves Internet user's organization configurations problem.The department of the inside and outside association of Internet user's network configuration does not treat as management itself with NA/UEC;, NA/UEC must analyze the inside and outside associated configurations problem of Internet user's network configuration in earnest before implementing; Seek solution route, and do not rely on NA/UEC solve problem excessively.What correctly is familiar with NA/UEC and is and what is not; Will implement the inside and outside problem that exists in the configuration that is associated in of serious analysis Internet user network configuration before at NA/UEC; Understand the effect of NA/UEC to addressing these problems; The abundant plan and the practicable program of utilizing NA/UEC to address these problems provides the basis for NA/UEC gives full play to efficient carefully.
In recent years, the fusion of ICT industry three macroreticulars and system for cloud computing technology were pushed ahead international and domestic always energetically.Grid attempts to realize the overall sharing of interconnected internet resource, comprises information resources, data resource, computational resource and software resource etc.Therefore, can regard grid as a high performance network computer, it is wideer than general network machine bandwidth, computational speed sooner, intelligent more, more can effectively utilize various resources.Grid adopts the international uniform standard, and this can provide unified port service with regard to meaning it for the object of various different hardware types, different operating system, make people convenient and swift just as water, electricity consumption with grid.The Open Grid Service structure OGSA (Open Grid Services Architecture) that is proposed by WorldNet's lattice theory altar is the most influential mesh architecture, and it changes the application of grid over to commercial field from scientific domain.
But at present, the fusion of ICT industry three macroreticulars just is being absorbed in the dangerous condition of dying young, the novelty wretched insufficiency of cloud computing technology, and the application of cloud computing meets with all restrictions, and the exploitation of cloud computing system meets with heat, cold difficult situation out of trade in the industry.The fast development of the Along with computer technology and the network technology, along with the increase day by day of financial innovation and financial risks, market competition is further aggravated, and the space and the scope of Internet user's competition further enlarge, and the integrated of global economy also constantly pushed ahead.Twentieth century progressively develops into the configuration thought of how effectively utilizing and disposing whole resource mainly towards the thought of the comprehensive configuration of Internet user's internal resource the nineties thereupon.Under this situation, the notion report of NA/UEC has been proposed at first.
The logical set of the remittance of setting up integrated economic multiattribute measure space based on intelligence, based on intelligence the logical operator of the remittance of integrated economic more rules metric matrix, integrated economic multiple-factor becomes the comprehensive remittance of power and is open to the custom and is and based on intelligence on the basis of the remittance pass function of integrated economic multiplicity algebra system based on intelligence, it is platform and the brand-new network system that logistics network, knowledge network and banking network are combined together that the inventor proposes will develop and set up with the information network---" whole world dynamically converge open network "; And then propose to develop and to set up and a kind of cloud computing and grid computing included at interior brand-new counting system---dispose and " world " computation schema of allocation of financial resource towards knowledge resource configuration, physical resources; Again and then to propose to develop and to set up a kind of serve as crucial and brand-new operation system that various cognitive operation and practice are combined together with computer operating system and internet operating system---and " holographic co-operation system " (OS/HSO).
Calculating of the open network and the network configuration world thereof and the holographic co-operation (abbreviation OS/HSO of system dynamically converge in the whole world that inventor's proposition will be developed and set up; Operating System of Holo-synergetic Oganization), be a complete complex system.The network configuration world is calculated and is intended to through the logistics under the information network support, knowledge, the full open network that converges of finance; The computational entity that a plurality of costs are relatively low is integrated into a complete intelligent integrated system with powerful calculating ability; And, this powerful computing ability is distributed in the terminal use's hand of information network inside and outside by brand-new business models such as information network inside and outside SaaS/HSO, PaaS/HSO, IaaS/HSO, MSP/HSO.
The whole world is dynamically converged open network and is calculated notion to can be regarded as a kind of be platform and logistics network, knowledge network and banking network compiled connect the application model of getting up with the information network.Not only computer-oriented and information network are calculated in the whole world dynamically remittance open network, and towards logistics network, knowledge network and banking network.It is attempted to surmount information calculations and information network and calculates, and information calculations and information network calculating and logistics network, knowledge network and banking network is compiled connect and operation is closely linked, and realization is intelligent integrated.
The GVC that the inventor proposes dynamically converges open network system DCN/IIL (VCSE); Be meant with the multimodal value chain system (VCS of multilayer level; From value of the product chain PVC, enterprise value chain EVC; To industry value chain IVC, regional value chain RVC; So that national value chain NVC, GVC GVC) be core; Be fused to the major technique support with telecommunications network (MCN), computer network (WWW) and broadcasting and television network (BTN) three macroreticulars, logistics net (MN), ability drift net (EN), information network (IN), Network and Finance Network (FN) and knowledge knowledge network (KN) five macroreticulars are combined together, the global open network system of the comprehensive integration business service of full field, total system, overall process is provided.
Summary of the invention
(1) for the Internet user terminal; The inventor is on the brand-new logical foundations of its independent foundation, Fundamentals of Mathematics, scientific basic and brand-new technology basis and engineering foundation; " world " counting system that converges logical all things on earth, connects longitude and latitude for " cloud " counting system that flicker is indefinite is transformed into; Adhere to that with the GVC system be core; With the connection of IU cognitive system (RS and computer aided system thereof) and IU practice system (PS and computer aided system thereof) with coordinate main line, set up network configuration " world " principle of calculating, Fundamentals of Mathematics and master-plan framework as high-grade intelligent integrated system (HIIS) evolution process.
(Heaven-Earth Computing of PA) calculated in the network configuration world that (1. 1) inventor proposes to develop and to set up; With the GVC is core; With the integrated key that turns to of intelligence, be based upon on brand-new logical foundations, Fundamentals of Mathematics, scientific basic and brand-new technology basis and the engineering foundation.
Importance as the calculating of the network configuration world; Calculating towards the IU network configuration world at Internet user terminal is the development of Internet user's terminal inner distributed treatment (Distributed Computing), parallel processing (Parallel Computing) and grid computing (Grid Computing) and cloud computing (Cloud Computing), or perhaps the commerce of these computer science notions realizes; And then be the development of the quantitative analysis of Internet user's exterior of terminal miscellaneous service area of activities, the analysis of financial statement, accounting technology, or perhaps the network integration of measuring science, statistical theory and accounting.  
Network configuration world principle of calculating can be summarized as follows:
With the GVC is core; Through COMPUTER CALCULATION being distributed on a large amount of distributed computers; But not in local computer or the remote server, make the operation of the various configuration center of Internet user's exterior of terminal (physical resources configuration center, knowledge resource configuration center, the value resource configuration center relevant) get into holographic joint management process with the information resources configuration center.This makes that the various enterprises in Internet user's network configuration inside and outside can be with resource switch to the application of needs, according to demand visit information network inside and outside operational system and storage system.  
The application that calculate in the IU network configuration world comprises so a kind of thought, joins together strength, uses for each member of Internet user's network configuration inside and outside.
Judge that certain computation schema is three standards that calculate in the network configuration world:
As the public, need to differentiate that which is the true world, which is the false world.For this reason, the inventor proposes to judge that certain computation schema is three normative references that calculate in the network configuration world, supplies everybody reference:
A1, Internet user's network configuration are core with the value chain, the dynamic remittance open network system that the required various resources (being not limited only to information resources) of inside and outside user form from being merged by logistics, knowledge, financial three macroreticulars under the information network support.
This is the basic theory place that calculate in the IU network configuration world; Promptly, the required information network inside and outside computing power of user, memory space, software function and the inside and outside service of Internet user's network configuration etc. are provided through merging the dynamic remittance open network system that forms by logistics, knowledge, financial three macroreticulars under the information network support.
A2, Internet user's network configuration are core with the value chain, and the inside and outside service ability has the flexible ability of minute level or second level.
If Internet user's network configuration inside and outside resource node service ability is not enough; But dynamically converge the flow of open network system in case increase severely; At this moment need platform within one minute a few minutes; Automatically dynamically increase the quantity of Internet user's network configuration inside and outside service node, expand to 15000 nodes from 10000 nodes.Technical foundation as the integrated dynamic remittance open network of state-of-the-art intelligence; The calculating of the network configuration world must have the enough resources in Internet user's network configuration inside and outside and deal with the peak flow of dynamic remittance open network system, even occurred " Obama " such focus suddenly.Spent a period of time, the open network system flow that dynamically converges has got off, and the quantity of Internet user's network configuration inside and outside service node is reducing along with the minimizing of flow.It is to expect that problem is dynamically converged open network system flow, can not wait so of a specified duration.
A3, Internet user's network configuration are core with the value chain, have than the ratio of performance to price advantage more than the traditional mode several times
Why calculate in the network configuration world will become a kind of epoch-making technology; Exactly because its one side cheap computer that quantity is huge places among the resource ocean, Internet user's network configuration inside and outside; Reduce Internet user's terminal inner hardware cost with software fault-tolerant; Be deployed in cold and the electric power resource abundant area is saved power cost through Internet user's terminal inner facility that the network configuration world is calculated, shared the making through scale is used for improving resource utilization; On the other hand with quantity very huge various residents, manufacturer, mechanism and tissue place among the resource ocean, Internet user's network configuration inside and outside; Reduce Internet user's exterior of terminal hardware cost with software fault-tolerant; Internet user's exterior of terminal facility through the network configuration world is calculated is deployed in low cost, operating cost is saved in low consumed area, and shared the making through scale is used for improving resource utilization.
The main service form that calculate in (1. 2) IU network configuration world:
A1. SAAS/HSO [IU] (Internet user's network configuration inside and outside software is promptly served)
SAAS/HSO [IU] (Internet user's network configuration inside and outside software is promptly served) is improvement and the expansion of SAAS (software is promptly served)
Such network configuration world is calculated and is passed to thousands of user to program through Internet user's network configuration inside and outside browser.In the user's eye of Internet user's network configuration inside and outside, can save the spending on Internet user's network configuration inside and outside server and soft ware authorization like this; Supplier's angle from Internet user's network configuration inside and outside, it is just much of that so only need to keep a program, can reduce cost like this.SAAS/HSO will become form relatively more commonly used in human resource management program and ERP.
A2. the practical calculating in Internet user's network configuration inside and outside (Utility Computing/HSO [IU])
Practical calculate (Utility Computing/HSO [IU]) in Internet user's network configuration inside and outside is practical improvement and expansion of calculating (Utility Computing).
Calculate in this network configuration world is to become resource ocean, an information network inside and outside and come for whole dynamic remittance open network service to be provided for various resource distributions center, Internet user's network configuration inside and outside makes it to put together the storage of Internet user's network configuration inside and outside, I/O equipment and Internet user's network configuration inside and outside computing capability.
A3. Internet user's network configuration inside and outside service
The service of Internet user's network configuration inside and outside is the improvement and the expansion of Internet user's terminal service.
Same SAAS/HSO [IU] is in close relations; Internet user's network configuration inside and outside ISPs can provide API to let the developer can develop more application based on dynamic remittance open network, rather than Internet user's terminal inner program only is provided.
A4. Internet user's network configuration inside and outside platform is promptly served
It is improvement and the expansion that platform is promptly served that Internet user's network configuration inside and outside platform is promptly served.
This is another kind of SAAS/HSO [IU], and the network configuration world of this form is calculated and provided Internet user's network configuration inside and outside development environment as a kind of service.You can use agent's equipment to develop the Internet user's network configuration inside and outside program of oneself and pass in user's hand through dynamic remittance open network and server thereof.
A5. MSP/HSO [IU] (Internet user's network configuration inside and outside managed service provider)
MSP/HSO [IU] (Internet user's network configuration inside and outside managed service provider) is improvement and the expansion of MSP (managed service provider).
This application more is towards Internet user's network configuration inside and outside managed service provider rather than terminal use, can be used for the inside and outside input scan of Internet user's network configuration, program monitoring or the like.
A6. Internet user's network configuration inside and outside commerce services platform
Internet user's network configuration inside and outside commerce services platform is the improvement and the expansion of commerce services platform.
The interaction that the mixing application of SAAS/HSO [IU] and MSP/HSO [IU], such network configuration world are calculated as between Internet user's network configuration inside and outside user and the provider provides a platform.Such as Internet user's network configuration inside and outside individual subscriber spending management system, can manage its spending and coordinate the various services of its order based on being provided with of user.
A7. Internet user's network configuration inside and outside is integrated
It is improvement and the expansion that the Internet is integrated that Internet user's network configuration inside and outside is integrated.
Internet user's network configuration inside and outside user provide the company of similar service to integrate dynamically converging on the open network, so that can compare and select the service supplier of oneself more easily.
The mathematical description letter example that (1. 3) intelligent integrated technology constitutes: the mathematical description that interface, Internet user terminal " people's one machine " is formed.
In interface, Internet user terminal " people's one machine ", measuring terminals generally comprises: vision terminal (like display screen, dial plate etc.), sense of hearing terminal (like loudspeaker, buzzer etc.) and sense of touch terminal (like each switch of appearance of machine, turn-button, handle, runner etc.).They utilize different modes, transmit the information of machine and target to the people through different channels.Because each measuring terminals mainly is perception and information to the people to be provided in the interface, and is time-varying system, so we can cast aside its other characteristics, and the most suitable with its recognition feature vector matrix notation.
Await developing energetically the NA/UEC of foundation; Be a information integration, and NA/IVC is an information integration towards supply chain network operation (Netting Operation of Supply Chain) towards Internet user's effect chain network operation (Netting Operation of User Efficiency Chain).Outside manufacturing, supply and marketing, monetary items function and the various back-up system and the technology of NA/IVC system; NA/UEC combines vertically reaching laterally related product, project and field on Internet user's effect chain, has following a series of brand-new technology:
The 282nd Internet user's terminal network dispensing unit of the 281st Internet user's terminal network configuration mechanism design basis design basis
The ICT technical support design of the 283rd Internet user's terminal network configuration dynamic foundation
The ICT technical support of the 284th Internet user's terminal network configuration odds ratio designs the 285th the holographic collaborative ICT technical support design of Internet user's terminal network configuration
The 286th Internet user's terminal network disposes the ICT technical support design of integrated function)
The 287th Internet user's terminal network configuration is worth the ICT technical support design of metering
The ICT technical support design of the 298th Internet user's terminal network configuration joint management
The 289th the holographic butt joint of Internet user's terminal network configuration balancing technique basis
The 290th the balanced tabular technology of the holographic butt joint of Internet user's terminal network configuration
The ICT technical support that the ICT technical support of the 291st Internet user's terminal network disposal subject designs the 292nd Internet user's terminal network configuration load designs the ICT technical support design of the 293rd Internet user's terminal network configuration mode
The ICT technical support design of the 294th Internet user's terminal network configuration-system
The ICT technical support design of the 295th Internet user's terminal network configuration surroundings
The ICT technical support of the 296th Internet user's terminal network allocation project designs the ICT technical support basis that the 297th Internet user's terminal network disposes just system
The 298th Internet user's terminal network configuration intelligent integral system-computed technical foundation
The 299th Internet user's terminal network configuration intelligent integral operation system technology basis
The 300th Internet user's terminal network configuration intelligent integral dynamically converges and leads to technical foundation
Steering controller mainly is the control information to machine transmission people in interface, Internet user terminal " people's one machine ".Its form and quantity are all a lot, can be divided into by people's operating position: manually and two types of foot-propelleds; Can be divided into by its function: four types of switch, transducer, adjuster and accident brakes; Also can divide by other character.We carry out mathematical description by its not only representative but also better function division methods of describing.For steering controller, we are concerned about is it and people's output matching problem, thereby generally described with the form of transfer function.
To perceptual organ's (eye, ear, body etc.) of people, what we were concerned about is the capacity of its perception information in the unit interval.Action organ to the people---neural, muscle parts, we are concerned about its accuracy of action, high efficiency.Get the mathematical description of a more comprehensive linear model below for Internet user terminal perception one moving system:
Except being made up of the key element of thing and system thereof, Internet user's network configuration techniques can also be by people and organizational composition thereof.The latter can be called Internet user's network configuration techniques tissue or intelligent integrated technology personnel.The function of intelligence integrated technology personnel or tissue mainly comprises with effect: the consulting of decision-making and consultant; The reception of information and transmission; Task executions and guarantee; Member's training and guidance; The verification of level and checking; Extraneous public relations and recommendation; The coordination of behavior and standard.
Internet user's network configuration techniques tissue comprises consulting technical organization, information technology tissue, safeguards technique tissue, exchanges technical organization, agent skill group tissue, training technique tissue, verification technique tissue, coordination technique tissue, assessment technology tissue, or the like.
Provide the Hiberarchy Decomposition Mathematical Modeling of Internet user's network configuration techniques based on structure and behavior at present.If WExpression Internet user network configuration techniques is right WAfter carrying out Hiberarchy Decomposition by structure and function, WStructurally can represent to become a hierarchical set
Figure 2011103416922100002DEST_PATH_IMAGE004
(?2.?25?)
Wherein W i ( i=1,2 ..., n) be WSon technology.
Internet user's network configuration techniques WCarry out a hierarchical structure directed graph of Hiberarchy Decomposition by structure and function BBe defined as a doublet
?B?=?(? VD?) (?2.?26?)
Wherein Be node set, D= W* WDirected edge set for link node.
By BThe linking matrix ACan calculate WReachability matrix EPreceding nodal set (ancestor set) and follow-up nodal set (descend set)
Be BMiddle nodal set VOn two functions, they define respectively as follows:
(?2.?27?)
Figure 2011103416922100002DEST_PATH_IMAGE010
(?2.?28?)
The utilization reachability matrix E, BMiddle nodal set VCan resolve into RnIndividual stratum level V l, V 2..., V n , wherein
Figure 2011103416922100002DEST_PATH_IMAGE012
Figure 2011103416922100002DEST_PATH_IMAGE014
Figure 2011103416922100002DEST_PATH_IMAGE016
Here m(≤ n) be to make
Figure 2011103416922100002DEST_PATH_IMAGE018
Positive integer.This is called hierarchical structure (1evel-structure).
As follows soluble to this hierarchical structure: Internet user's network configuration techniques WIn each son technology W j All can be considered an analytic target, and this analytic target W j Belong to and only belong to some object class V k , promptly W j V K , it is an object class V k Taxonomical hierarchy structure (the hierarchical structure directed graph at place B) a element in the portion, and each analytic target W j Between (be connected matrix relationship through Hiberarchy Decomposition relation A) NTaxonomical hierarchy structural relation (reachability matrix relation E) organic connections get up.
General technique with single node WConstitute first level of Hiberarchy Decomposition model, and the hierarchical structure directed graph BThe second layer that constitutes Internet user's network configuration techniques Hiberarchy Decomposition model is secondary.On this basis,, continue each son technology is carried out Hiberarchy Decomposition by structure and function, obtain corresponding according to above-mentioned Hiberarchy Decomposition model nIndividual hierarchical structure directed graph
(?2.?29?)
This nThe set that individual hierarchical structure directed graph is formed B j Portion constitutes the tri-layer level of Hiberarchy Decomposition model.The hierarchical structure directed graph BBe called the absolute construction (independent structure) on the Hiberarchy Decomposition model tri-layer level, its element is called structural element.
The logical mathematics trade-off analysis frame system of holography remittance that the inventor sets up mainly comprises: the holography of metasystem science converges leads to mathematics trade-off analysis method frame; The trade-off analysis method frame is led in the full remittance of metasystem science; The holography of metasystem science converges leads to category trade-off analysis method frame.The substance of this frame system comprises: Internet user's network configuration and Quan Huitong balance set; Multiple target is selected and Quan Huitong balance operator; Complexity is estimated and Quan Huitong balance relation; Group decision system and Quan Huitong balance mapping; Incomplete information and Quan Huitong balance rule; Heuristic yojan and Quan Huitong balance system; Internet user's Intelligent Terminal algebraically and Quan Huitong balance function; Complete logical thinking and the Quan Huitong balance model of converging; Quan Huitong proposition and Quan Huitong balance logic; Complete logical theory and the Quan Huitong balance category of converging.
(2) for the Internet user terminal; The inventor is on the brand-new logical foundations () of its independent foundation, Fundamentals of Mathematics (), scientific basic () and brand-new technology basis () and engineering foundation (); " world " counting system that converges logical all things on earth, connects longitude and latitude for " cloud " counting system that flicker is indefinite is transformed into; Adhere to that with the GVC system be core; With the connection of IU cognitive system (RS and computer aided system thereof) and IU practice system (PS and computer aided system thereof) with coordinate main line, set up logical foundations and Fundamentals of Mathematics that network configuration " world " is calculated as high-grade intelligent integrated system (HIIS) evolution process---the holographic unifier number system that converges.
(2. 1) are to the optimizing in Internet user's network configuration process multistage path, based on the following principle of R. Bellman [275]:
Optimal policy as whole process has such character, that is: regardless of state of passing by and decision-making, as far as the formed state of the decision-making of front, remaining all decision-makings must constitute optimal policy.
Utilize this principle, we can regard the solution procedure of Internet user's network configuration process multistage optimum path search problem as a continuous recursive process, by after progressively calculate forward.When finding the solution, the state of each state front and decision-making concerning the subproblem of its back, only are equivalent to its initial condition, do not influence the optimal policy of back process.For example, for Internet user's network configuration process multistage path network,, capable of using in each stage of finding the solution kStage with kRelation between+1 stage is following:
Figure 2011103416922100002DEST_PATH_IMAGE022
This recurrence relation can be described as the equation of practice process multistage optimum path search.This functional equation is to derive according to the principle of optimality of Bellman to get.
The basic thought of Internet user's network configuration process multistage optimum path search can be summarized as follows:
The key of multistage optimum path search; Be the application of Bellman principle of optimality, this principle is summed up as with a basic recurrence relation formula makes the continuous transfer of process, asks separating of this type problem; To be undertaken by the order of turning around, promptly begin piecemeal to starting point direction finding optimum way from terminal point.
Internet user's network configuration process multistage optimum path search can be regarded as the expansion of Dynamic Programming, and it comprises:
Optimum path search (Dynamic Programming A) towards Internet user's network configuration tissue;
Optimum path search (Dynamic Programming B) towards Internet user's network configuration object;
Optimum path search (Dynamic Programming C) towards Internet user's network configuration techniques;
Optimum path search (Dynamic Programming D) towards Internet user's network configuration environment:
If the numbering of the stage in Internet user's network configuration process multistage path network and practical problem stage, sequence number was opposite the time, then can get recurrence relation and be by the method for above-mentioned Dynamic Programming optimizing approach:
Figure 2011103416922100002DEST_PATH_IMAGE024
GThe GC group connector state.
If given stage condition variable x k Value, the decision variable of this section then u k Once definite, the k + 1 section state variable x k+ 1 Value also just definite fully. x k+ 1 Value with x k With u k Value variation and this corresponding relation that changes is available
x ?k?+?1 ?=? T ?k ?(? x ?k? ,? u ?k? )
Represent it.We can be referred to as state transition equation.
If from x k Set out, have
Figure 2011103416922100002DEST_PATH_IMAGE026
Figure 2011103416922100002DEST_PATH_IMAGE028
So can get
Figure 2011103416922100002DEST_PATH_IMAGE030
And
This is the basic skills of backward solution.
For sequential solution method, if the section ordinal number kAnd state variable x k Definition constant, and decision variable u k Be defined as u k =
x k , then the general state equation of transfer be not by x k , u k Go to confirm x k+ 1 , but by x k+ 1 , u k Go to confirm x k , promptly state transition equation does
x ?k ?=? T * k ?(? x ?k?+?1? ,? u ?k? )
For given x k , all are alternative u k– 1 The set be defined as by kSection arrives kThe permission decision-making set that – is 1 section is used
Figure 2011103416922100002DEST_PATH_IMAGE036
Expression so can get the fundamental equation of sequential solution method does
Figure 2011103416922100002DEST_PATH_IMAGE038
Wherein x k– 1 = T * k– 1 ( x k , u k– 1 ).
(2. 2) Internet user's network configuration network can be regarded as by a kind of by the node of some (or variable number) and the set that chain constituted of some (or variable number).
We can be divided into following four levels with diverse network:
Resource network (RN): resource node (r n)---resource chain (r c)---resource collection (rs)
Configuration network (DN): configuration node (dn)---configuration chain (dc)---configuration set (ds)
Tissue set (os) that organization network (ON): organize node (on)---is organized chain (oc)---
Group's network (GN): group's node (gn)---group's chain (gc)---group set (gs)
Resource network can remember work: RN=RN (r n, r c, rs); Configuration network can remember work: DN=RN (dn, dc, ds); Organization network can remember work: ON=RN (on, oc, os); Group's network can remember work: GN=RN (gn, gc, gs).
From the status of resource distribution be used for seeing that in resource was converged open network CN, the resource distribution network can be divided into following three types: major flow MF, support stream SF, auxiliary flow AF.
Substantially, resource remittance open network CN can be divided into following nine seed categories:
CN?[?MF?(?IN?);?SF?(?RN?),?AF?(?MN?)?],?CN?[?MF?(?IN?);?SF?(?MN?),?AF?(?RN?)?],
CN?[?MF?(?IN?);?SF?(?RN?),?SF?(?MN?)?];
CN?[?MF?(?RN?);?SF?(?IN?),?AF?(?MN?)?],?CN?[?MF?(?RN?);?SF?(?MN?),?AF?(?IN?)?],
CN?[?MF?(?RN?);?SF?(?IN?),?SF?(?MN?)?];
CN?[?MF?(?MN?);?SF?(?IN?),?AF?(?RN?)?],?CN?[?MF?(?MN?);?SF?(?RN?),?AF?(?IN?)?],
CN?[?MF?(?MN?);?SF?(?IN?),?SF?(?RN?)?]。
The remittance reduction of fractions to a common denominator of the integrated mathematics of Internet user's network configuration system synthesis the two poles of the earth is analysed frame system and is mainly comprised: complicated intelligent multiattribute measure space analytical method framework; The complete logical set analysis method frame of the two poles of the earth remittance that contains of complicated intelligence; Logical categorical analysis method frame converges at complicated intelligence complete complete the two poles of the earth.The substance of this frame system comprises: logical set converges for multiattribute measure space and the two poles of the earth; Logical operator converges for more rules metric matrix and the two poles of the earth; The multiple-factor change is weighed comprehensive and Liang Jihui is open to the custom is; Multiplicity algebra system and the two poles of the earth remittance pass function; Logical set and the logical mapping of the two poles of the earth remittance converge at full implication the two poles of the earth; Logical set and the logical conversion of the two poles of the earth remittance converge at full expansion the two poles of the earth; Heuristic yojan based on information fusion; Logical proposition and the logical logical formula of the two poles of the earth remittance converge at the two poles of the earth; Logical category system converges for complete complete theory and the two poles of the earth; Comprehensive analysis based on neural net.
The new analysis-by-synthesis frame system of Internet user's network configuration system gaming coordination mainly comprises: reduction of fractions to a common denominator analysis method framework converges at the big system gaming rule of Internet user's terminal intelligent synergetics the two poles of the earth; Reduction of fractions to a common denominator analysis method framework converges at the big system gaming pattern of Internet user's terminal intelligent synergetics the two poles of the earth; Reduction of fractions to a common denominator analysis method framework converges at the big system gaming of Internet user's terminal intelligent coordination the two poles of the earth.The substance of this frame system comprises: logical composite equation converges at Game Rule synergetics multi-mode the two poles of the earth; Game Rule synergetics class is the logical differential equation of the two poles of the earth remittance at random; The basis is analysed in the remittance reduction of fractions to a common denominator of Game Rule synergetics quasi-representative the two poles of the earth; The basis is analysed in the remittance reduction of fractions to a common denominator of Game Rule synergetics atypia the two poles of the earth; The basis is analysed in the remittance reduction of fractions to a common denominator of game play mode synergetics class statistics the two poles of the earth; The game play mode synergetics can be expanded the two poles of the earth remittance reduction of fractions to a common denominator and analyse the basis; The game coordination can be expanded the two poles of the earth remittance reduction of fractions to a common denominator and analyse model; Logical model converges at game coordination type transition process the two poles of the earth; Logical model converges at game coordination type birth and death process the two poles of the earth; Logical model converges at game coordination type alternative Process the two poles of the earth.
The new trade-off analysis frame system of the integrated mathematics of Internet user's network configuration system synthesis mainly comprises: complicated intelligent multiattribute space balance analytical method framework; The full set trade-off analysis method frame that contains of complicated intelligence; The complete complete category trade-off analysis method frame of complicated intelligence.The substance of this frame system comprises: intelligent integrated and intelligent balance set; Multiple target is selected and intelligence balance operator; Complexity is estimated and intelligence balance relation; Group decision system and intelligence balance mapping; Incomplete information and intelligence balance rule; Heuristic yojan and intelligent balance system; Intelligent algebraically and intelligence balance function; New wisdom thinking and intelligence balance model; New wisdom proposition and intelligence balance logic; New wisdom theory and intelligence balance category.
The metasystem science that the inventor sets up is holographic converges the reduction of fractions to a common denominator and analyses and the complete logical trade-off analysis basic procedure (, 2007) shown in Fig. 3 that converges.
As full remittance way system process, Internet user's network configuration of analysing based on the holography remittance reduction of fractions to a common denominator is main object with IU network configuration system problem always.And IU network configuration system has some and common linear system different features, mainly shows: non-linear, the dynamic of system of structure and the uncertainty and the incompleteness of opening and information.Characteristics in view of complicated Internet user's netconfig problem only rely on quantitative model
Be difficult to describe and find the solution complicated Internet user's netconfig problem.From Internet user's network configuration angle of analysing based on the holography remittance reduction of fractions to a common denominator, we can see that the solution procedure of complicated Internet user's netconfig problem needs the diversification model supports.According to the cognitive level of complicated Internet user's netconfig problem, this joint will propose to comprise conceptual model, structural model and Mathematical Modeling in the diversification model system of complicated Internet user's netconfig problem, and this three class model is discussed.
If Internet user network configuration person is to state space ΘInformation understand fully, can be described as and confirm type Internet user netconfig problem; To state space ΘMessage part understand, can be described as state of risk Internet user netconfig problem; To state space ΘInformation do not understand, can be described as uncertain type Internet user netconfig problem.The character of Internet user's netconfig problem is constant before information acquisition, and state of risk Internet user network configuration remains state of risk Internet user network configuration, and knowledge has increased an action that obtains complete information.
Suppose that the two poles of the earth converge the reduction of fractions to a common denominator and analyse system and comprise mIndividual attribute (index) P 1, P 2,, P m , have lIndividual test and appraisal person.By lIndividual test and appraisal person provides the most important attribute and the ratio of important attribute least jointly R, RConfirm to press in the AHP method 1 ~ 9 scale and standard.To each test and appraisal person's tolerance, carry out assignment by the ordering of each attribute, the more little assignment of sequence number is big more.
Will lIndividual test and appraisal person is right mThe value that individual attribute is composed is divided into rPiece is designated as respectively P[1], P[2],, P[ r], wherein, matrix P[ k] line display with P k Be test and appraisal person's number of important attribute least, note is done l k Tabulation is shown attribute P k As benchmark, to each attribute P 1, P 2,, P m The value of being composed.Concrete form is:
(?3.?7.?60?)
Here
Figure 2011103416922100002DEST_PATH_IMAGE042
,
Figure 2011103416922100002DEST_PATH_IMAGE044
, and
Figure 2011103416922100002DEST_PATH_IMAGE046
i=1,2,, l k ; j=1,2,, m
For matrix in block form P[ k], because of each attribute assignment all with P k Be benchmark, thus can be right P[ k] each is listed as and averages respectively
Figure 2011103416922100002DEST_PATH_IMAGE048
j?=?1,?2,?···,? m。(?3.?7.?61?)
By the capable vector of (3. 7. 61) Shi Kede
Figure 2011103416922100002DEST_PATH_IMAGE050
, wherein represent with P k For important attribute least l k Individual test and appraisal person is right mThe value that individual attribute is composed.The vector of will going is regular, can get each attribute P j
Figure 2011103416922100002DEST_PATH_IMAGE052
In shared proportion
Figure 2011103416922100002DEST_PATH_IMAGE054
(?3.?7.?62?)
All matrixs in block form are done above-mentioned processing, can obtain
Figure 2011103416922100002DEST_PATH_IMAGE056
respectively.
For each matrix in block form P[ k] ( i=1,2,, r), because of line number l k Difference, it is at test and appraisal person's number lMiddle proportion is also different, thereby needs to consider l k lMiddle proportion is claimed l k / lFor
Figure 2011103416922100002DEST_PATH_IMAGE058
Weight coefficient.
Comprehensive above-mentioned analysis can get attribute P j The two poles of the earth converge logical:
Figure 2011103416922100002DEST_PATH_IMAGE060
j?=?1,?2,?···,? m。(?3.?7.?63?)
Can gather by (3. 7. 60) ~ (3. 7. 63) lIndividual test and appraisal person is right mThe value that individual attribute is composed, the two poles of the earth that get are to the end converged logical.
Converge logical by the two poles of the earth a j In obtain minimum value a MinAnd maximum a Max, make its pairing subscript be respectively lWith L, promptly
a ?l ?=? a ?mina ?L ?=? a ?max?。Will P[ K] each row respectively divided by a l Pairing row,
Figure 2011103416922100002DEST_PATH_IMAGE062
(?3.?7.?64?)
With
Figure 2011103416922100002DEST_PATH_IMAGE064
Ask method identical, can get P l With P L P' [ k] in shared proportion
Figure 2011103416922100002DEST_PATH_IMAGE066
With
Figure 2011103416922100002DEST_PATH_IMAGE068
:
Figure 2011103416922100002DEST_PATH_IMAGE070
(?3.?7.?65? a?)
Figure 2011103416922100002DEST_PATH_IMAGE072
(?3.?7.?65? a?)
With a i Ask method identical, can obtain A MinWith A Max:
,
Figure 2011103416922100002DEST_PATH_IMAGE076
(?3.?7.?66?)
AThe two poles of the earth converge and logically to do A= A Max/ A Min
Through above right a i With AFind the solution, correspondingly construct metric matrix:
(?3.?7.?67?)
It is following that (2. 3) inventor tentatively sets up the holographic unifier number system that converges:
Define 7. 4. 5 for the logical set of holography remittance X HH , one from
Figure 2011103416922100002DEST_PATH_IMAGE080
Arrive Y HH Mapping, can be described as the holographic logical set that converges X HH On one nN ary operation.If
Figure 2011103416922100002DEST_PATH_IMAGE082
, then claiming should nThe logical computing of unit's remittance is sealed.
Define holographic remittance of 7. 4. 61 non-NULLs and lead to set X HH Be defined in the logical computing of remittance in this set together with several f HH, 1 , f HH, 2 ,, f HH, k The system that is formed can be described as a holographic unifier number system that converges, and note is done
<? X ?HH ?,? f ?HH,?1? ,? f ?HH,?2? ,?···,? f ?HH, k >。
Positive integer is holographic converges logical the set I HH,+ And a holographic unifier number system that converges is formed in the add operation "+" in this set< I HH,+ ,+>The limited holographic logical set that converges S HH , by S HH Power set P( S HH ) and the set operation on this power set " ∪ ", " ∩ ", " ~ " form a holographic unifier number system that converges
< ?P?(? S ?HH? ),?∪,?∩,?~?>。
Obviously, at holography remittance unifier number system< I HH ,+>(here I HH Be the integer set) in, about add operation, can set up following three operation rules, promptly for arbitrarily x, y, zI HH , have
a) x+ yI HH (closure)
For x+ yI IN , introduce the holographic logical degree function that converges μ HH , then have
Figure 2011103416922100002DEST_PATH_IMAGE084
For x+ yI EX , introduce the holographic logical degree function that converges μ HH , then have
Figure 854736DEST_PATH_IMAGE084
b) x+ y= y+ x(law of communication)
For x+ yI IN , introduce the holographic logical degree function that converges μ HH , then have
Figure 2011103416922100002DEST_PATH_IMAGE086
For x+ yI EX , introduce the holographic logical degree function that converges μ HH , then have
Figure 473981DEST_PATH_IMAGE086
c) ( x+ y)+ z= x+ ( y+ z) (associative law)
For x+ yI IN , introduce the holographic logical degree function that converges μ HH , then have
Figure 2011103416922100002DEST_PATH_IMAGE088
For x+ yI EX , introduce the holographic logical degree function that converges μ HH , then have
Figure 413380DEST_PATH_IMAGE088
Be not difficult to set up and some holographic unifier number systems that converge with identical operation rule.
The inventor tentatively sets up at present and holographicly converges unifier to count operation rule following:
Definition 7.4.7 establishes * and is defined in the holographic logical set that converges X HH On binary operation.If for arbitrarily x, yX HH Have x* yX HH , claim that then the logical computing * of this binary remittance exists X HH On seal.
Definition 7.4.8 establishes * and is defined in the holographic logical set that converges X HH On binary operation.If for arbitrarily x, yX HH Have x* y= y* x, claim that then the logical computing * of this binary remittance exists X HH On be tradable.
Defining 7. 4. 9 establishes * and is defined in the holographic logical set that converges X HH On binary operation.If for arbitrarily x, y, zX HH Have
(? x?*? y?)?*? z?=? x?*?(? y?*? z?),
Claim that then the logical computing * of this binary remittance exists X HH On be combinative.
Definition 7.4.10 establishes *, and Δ is to be defined in the holographic logical set that converges X HH On binary operation.If for arbitrarily x, y, z
X HH Have
x?*?(? y?Δ? z?)?=?(? x?*? y?)?Δ?(? x?*? z?)
(? y?Δ? z?)?*? x?=?(? y?*? x?)?Δ?(? z?*? x?)
The logical computing * that then claims to converge is tradable for the logical computing Δ of remittance.
Definition 7.4.11 establishes *, and Δ is to be defined in the holographic logical set that converges X HH On two commutative binary operations.If for arbitrarily x, yX HH Have
x?*?(? x?Δ? y?)?=? x?, x?Δ?(? x?*? y?)?=? x
The logical computing * that then claims to converge satisfies absorption law with the logical computing Δ of remittance.
Definition 7.4.12 establishes * and is defined in the holographic logical set that converges X HH On a binary operation.If for arbitrarily xX HH Have x* x= x, the logical computing * that then claims to converge is an idempotent.
Definition 7.4.13 establishes * and is defined in the holographic logical set that converges X HH On a binary operation.If for arbitrarily xX HH An element is always arranged e l X HH Satisfy e l * x= x, then claim e l For X HH In about converging the left identity element of logical computing *; If for arbitrarily xX HH An element is always arranged e r X HH Satisfy x* e r = x, then claim e r For X HH In about converging the right identity element of logical computing *; If for arbitrarily xX HH An element is always arranged eX HH Both satisfied e* x= x, satisfy again x* e= x, then claim eFor X HH In about converging the identical element of logical computing *.
Obviously, for arbitrary xX HH , have e* x= x* e= x
Be not difficult to obtain following theorem:
Theorem 7.4.1 establishes * and is defined in the holographic logical set that converges X HH On a binary operation, and X HH In relevant for converging the left identity element of logical computing * e l And right identity element e r , then e l = e r = e, and X HH In identical element be unique.
Proof slightly.
Definition 7.4.14 establishes * and is defined in the holographic logical set that converges X HH On a binary operation.If for arbitrarily xX HH An element is always arranged θ l X HH Satisfy θ l * x= θ l , then claim θ l For X HH In about converging the left null element of logical computing *; If for arbitrarily xX HH An element is always arranged θ r X HH Satisfy x* θ r = θ r , then claim θ r For X HH In about converging the right zero element of logical computing *; If for arbitrarily xX HH An element is always arranged θX HH Both satisfied θ* x= x, satisfy again x* θ= x, then claim θFor X HH In about converging the null element of logical computing *.
Obviously, for arbitrary xX HH , have θ* x= x* θ= θ
Be not difficult to obtain following theorem:
Theorem 7.4.2 establishes * and is defined in the holographic logical set that converges X HH On a binary operation, and X HH In relevant for converging the left null element of logical computing * θ l And right zero element θ r , then θ l = θ r = θ, and X HH In null element be unique.
Proof slightly.
Be not difficult to obtain following theorem:
Theorem 7.4.3 establishes< X HH , *>Be a holographic unifier number system that converges, and converge logical the set in holography X HH The number of middle element is greater than 1.If have identical element in this algebra system eAnd null element θ, then θe
Proof slightly.
Definition 7.4.15 establishes< X HH , *>Be a holographic unifier number system that converges, wherein * is defined in the holographic logical set that converges X HH On a binary operation, and eBe X HH In about the identical element of computing *.If for X HH An element aX HH An element is always arranged bX HH Satisfy b* a= e, then claim bFor X HH In about converging the left inverse element of logical computing *; If for arbitrarily aX HH An element is always arranged bX HH Satisfy a* b= e, then claim bFor X HH In about converging the right inverse of logical computing *; If for arbitrarily aX HH An element is always arranged bX HH Both satisfied a* b= e, satisfy again b* a= e, then claim bFor X HH In about converging the inverse element of logical computing *.
Obviously, if bBe aInverse element, aAlso be bInverse element, then claim aWith bInverse element each other.An element xInverse element be designated as x -1
Be not difficult to obtain following theorem:
Theorem 7.7.4 establishes< X HH , *>Be a holographic unifier number system that converges, wherein * is defined in the holographic logical set that converges X HH On a binary operation, X HH The middle identical element that exists about computing *, and each element always has left inverse element.Lead to computing if * is combinative remittance, so, the left inverse element of any one element must also be the right inverse of this element in this holographic remittance unifier number system, and the inverse element of each element is unique.
Proof slightly.
Set up below to converge and lead to the semigroup notion.
Definition 7.4.16 establishes< S HH , *>Be a holographic unifier number system that converges, wherein S HH Being that non-NULL is holographic converges logical the set, and * is defined in the holographic logical set that converges S HH On a binary operation, if converging logical computing * seal, then claim holographic remittance unifier number system< S HH , *>Be that broad sense is converged logical group.
Definition 7.4.17 establishes< S HH , *>Be a holographic unifier number system that converges, wherein S HH Being that non-NULL is holographic converges logical the set, and * is defined in the holographic logical set that converges S HH On a binary operation, if
a) converge logical computing * and seal;
b) to converge logical computing * be combinative, promptly to arbitrarily x, y, zX HH , satisfy
(? x?*? y?)?*? z?=? x?*?(? y?*? z?),
Then claim the holographic unifier number system that converges< S HH , *>Be to converge with leading to semigroup.
Be not difficult to obtain following theorem:
Theorem 7.4.5 establishes<<i >S</i><sub ><i >HH</i></sub>, *>Be a logical semigroup of remittance,<img file="2011103416922100002DEST_PATH_IMAGE090.GIF" he="25" img-content="drawing" img-format="GIF" inline="no" orientation="portrait" wi="62" />And * converges logical the set in holography<i >B</i><sub ><i >HH</i></sub>On seal, so,<<i >B</i><sub ><i >HH</i></sub>, *>It also is a logical semigroup of remittance.Can with<<i >B</i><sub ><i >HH</i></sub>, *>Regard as to converge and lead to semigroup<<i >S</i><sub ><i >HH</i></sub>, *>Sub-semigroup.
Proof slightly.
Be not difficult to obtain following theorem:
Theorem 7.4.6 establishes< S HH , *>Be a logical semigroup of remittance, if holographic the remittance logical the set S HH Be a finite aggregate, then must have aS HH , make a* a= a
Proof slightly.
Further, set up the logical crowd of remittance and lead to the subgroup notion with converging.
Definition 7.4.18 establishes< G HH , *>Be a holographic unifier number system that converges, wherein G HH Being that non-NULL is holographic converges logical the set, and * is defined in the holographic logical set that converges G HH On a binary operation, if
a) converge logical computing * and seal;
b) to converge logical computing * be combinative, promptly to arbitrarily x, y, zX HH , satisfy
(? x?*? y?)?*? z?=? x?*?(? y?*? z?),
c) there is an identical element e
d) for each element xG HH , exist its inverse element x -1
Then claim the holographic unifier number system that converges< G HH , *>Be one and converge logical group.
Definition 7.4.19 establishes< G HH , *>It is a holographic unifier number system that converges.If G HH Be the limited holographic logical set that converges, then can claim
< G HH , *>Be the logical crowd of limited remittance, G HH The number of middle element can be described as the logical order of a group number of this limited remittance, is designated as | G HH |; If G HH Be the unlimited logical collection that converges, then claim the holographic unifier number system that converges< G HH , *>Converge logical group for unlimited.
Be not difficult to obtain following theorem:
Theorem 7.4.7 establishes< G HH , *>Be one and converge logical group.For a, bG, must exist unique xG HH , make a* x= b
Proof slightly.
Be not difficult to obtain following theorem:
Theorem 7.4.8 establishes< G HH , *>Be one and converge logical group.For a, b, cG HH If have a* b= a* cOr b* a= c* a, then must exist b= c(cancellation law).
Proof slightly.
Be not difficult to obtain following theorem:
Theorem 7.4.9 converges logical group< G HH , *>Operation table in each the row or each row all be G HH A displacement of element.
Proof slightly.
Definition 7.4.20 establishes< G HH , *>Be one and converge logical group, S HH Be G HH Nonvoid subset.If< S HH , *>Also constitute and converge logical group, then claim the holographic unifier number system that converges< S HH , *>Be< G HH , *>One converge logical subgroup.
Be not difficult to obtain following theorem:
Theorem 7.4.10 establishes< G HH , *>Be one and converge logical group,< S HH , *>A sub-group that is, so, the holographic unifier number system that converges
< G HH , *>In identical element eMust also be< S HH , *>In identical element.
Proof slightly.
Tentatively setting up three types of new algebra systems---converge on the basis of unifier number system at absolute algebra system, relative algebraic system and the two poles of the earth, and the inventor considers to set up absolute ring, logical ring notion is converged at ring and the two poles of the earth relatively.
For two given absolute algebra systems< D A , ★>With< D A , ☆>, be not difficult they are combined into an absolute algebra system with two binary operations< D A , ★, ☆>Important point is associated absolute algebra system between two binary operation ★ and the ☆< D A , ★, ☆>Usually, we can be called " addition " with first binary operation ★, and second computing ☆ is called " multiplication ".For example, the absolute real number system that has these two binary operations of addition and multiplication< R A ,+, ×>With absolute integer system< I A ,+, ×>It all is absolute algebra system.For arbitrarily a, b, cR A (or I A ), have
a?×?(? b?+? c?)?=?(? a?×? b?)?+?(? a?×? c?)
(? b?+? c?)?×? a?=?(? b?×? a?)?+?(? c?×? a?),
This contact be exactly multiplying be assignable for add operation.
Definition 7.10.1 establishes< D A , ★, ☆>Be an absolute algebra system, if satisfy:
( a)< D A , ★>It is Abelian group;
( b)< D A , ☆>It is semigroup;
( c) computing ☆ is assignable for computing ★;
Then claim< D A , ★, ☆>It is absolute ring.
Definition 7.10.3 establishes< D A ,+,>Be an absolute algebra system, if satisfy:
( a)< D A ,+>It is Abelian group;
( b)< D A θ,>It is Abelian group;
( c) computing is for computing+be assignable;
Then claim< D A ,+,>It is absolute territory.
We can be with any a plurality of absolute rings (absolute algebra system)< D A , ★, ☆>Be the theory of basic structure, be called absolute theory.
For two given relative algebraic systems< D R , ★>With< D R , ☆>, be not difficult they are combined into a relative algebraic system with two binary operations< D R , ★, ☆>Important point is associated relative algebraic system between two binary operation ★ and the ☆< D R , ★, ☆>Usually, we can be called " addition " with first binary operation ★, and second computing ☆ is called " multiplication ".For example, the relative real number system that has these two binary operations of addition and multiplication< R R ,+, ×>With relative integer system< I R ,+, ×>It all is the relative algebraic system.For arbitrarily a, b, cR R (or I R ), have
a?×?(? b?+? c?)?=?(? a?×? b?)?+?(? a?×? c?)
And ( b+ c) * a=( b* a)+( c* a),
This contact be exactly multiplying be assignable for add operation.
Definition 7.10.4 establishes< D R , ★, ☆>Be a relative algebraic system, if satisfy:
( a)< D R , ★>It is Abelian group;
( b)< D R , ☆>It is semigroup;
( c) computing ☆ is assignable for computing ★;
Then claim< D R , ★, ☆>It is relative ring.
Definition 7.10.6 establishes< D R ,+,>Be a relative algebraic system, if satisfy:
(1)< D R ,+>It is Abelian group;
(2)< D R θ,>It is Abelian group;
(3) computing is for computing+be assignable;
Then claim< D R ,+,>It is relative territory.
We can be with any a plurality of relative rings (relative algebraic system)< D R , ★, ☆>Be the theory of basic structure, be called relative theory.
For two given the two poles of the earth remittance unifier number systems< D U , ★>With< D U , ☆>, be not difficult they are combined into a two poles of the earth remittance unifier number system with two binary operations< D U , ★, ☆>Important point is associated the two poles of the earth remittance unifier number system between two binary operation ★ and the ☆< D U , ★, ☆>Usually, we can be called " addition " with first binary operation ★, and second computing ☆ is called " multiplication ".For example, the logical real number system of the two poles of the earth remittance that has these two binary operations of addition and multiplication< R U ,+, ×>With the logical integer system of the two poles of the earth remittance< I U ,+, ×>It all is the two poles of the earth remittance unifier number system.For arbitrarily a, b, cR U (or I U ), have a* ( b+ c)=( a* b)+( a* c) and ( b+ c) * a=( b* a)+( c* a), this contact be exactly multiplying be assignable for add operation.
Definition 7.10.7 establishes< D U , ★, ☆>Be the two poles of the earth remittance unifier number system, if satisfy:
( a)< D U , ★>It is Abelian group;
( b)< D U , ☆>It is semigroup;
( c) computing ☆ is assignable for computing ★;
Then claim< D U , ★, ☆>It is the logical ring of the two poles of the earth remittance.
Definition 7.10.9 establishes< D U ,+,>Be the two poles of the earth remittance unifier number system, if satisfy:
( a)< D U ,+>It is Abelian group;
( b)< D U θ,>It is Abelian group;
( c) computing is for computing+be assignable;
Then claim< D U ,+,>It is the logical territory of the two poles of the earth remittance.
We can be with converge logical ring (relative algebraic system) with any a plurality of the two poles of the earth< D U , ★, ☆>Be the theory of basic structure, be called the logical theory of the two poles of the earth remittance.
C4 sets up under absolute theory, relative theory and the logical theory of the two poles of the earth remittance in the above, and the inventor considers to set up absolute category, relative category and the two poles of the earth remittance leads to category, the algebraic process of expansion proof.
Absolute category of definition 7.10.10 is an absolute algebra system:
C ?A ?=?(?ob? C ?A? ,?Hom? C ?A? ,?dom?,?cod?,?comp?)
It comprises absolute type of ob C A , absolute type Hom C A With three absolute functions:
dom?:?Hom? C ?A ?→?ob? C ?A? , cod?:?Hom? C ?A ?→?ob? C ?A? ,
comp:?Hom? C ?A ?×?Hom? C ?A? →?Hom? C ?A?
Wherein,
Ob C A Can be described as absolute category C A Object class, its element is called C A Object;
Hom C A Can be described as C A Attitude type of penetrating, its element is called C A Attitude penetrate;
Dom can be described as C A Function of region;
Cod can be described as C A Last function of region;
Comp can be described as synthetic that attitude penetrates.
They satisfy following condition:
( a1) to arbitrarily A A , B A ∈ ob C A , Hom C A ( A A , B A ) be Hom C A A sub-category, also note is done C A ( A A , B A ).If fC A ( A A , B A ), then dom ( f)= A A , cod ( f)= B A
( a2) to arbitrarily A A ∈ ob C A , have one i( A A ) ∈ C A ( A A , B A ), make:
( b1) if dom ( f)= A A , then comp ( f, i( A A ))= f
( b2) if cod ( f)= B A , then comp ( i( B A ), f)= f
( a3) to arbitrarily ( f, g) ∈ Hom C A * Hom C A , following equality is set up:
(? b?1?) dom?(comp?(? f?,? g?))?=?dom?(? g?);
(? b?2?) cod?(?comp?(? f?,? g?))?=?cod?(? f?)。
( a4) to arbitrarily ( f, g, h) ∈ Hom C A * Hom C A * Hom C A , following equality is set up:
comp?(? f?,?comp?(? g?,? h?))?=?comp?(comp?(? f?,? g?)?,? h?)。
fC A ( A A , B A ) can be designated as f: A A B A Comp ( f, g) can be designated as fo g
Relative category of definition 7.10.15 is a relative algebraic system:
C ?R ?=?(?ob? C ?R? ,?Hom? C ?R? ,?dom?,?cod?,?comp?)
It comprises relative type of ob C R , relative type Hom C R With three relative functions:
dom?:?Hom? C ?R ?→?ob? C ?R? , cod?:?Hom? C ?R ?→?ob? C ?R? ,
comp:?Hom? C ?R ?×?Hom? C ?R? →?Hom? C ?R?
Wherein, ob C R Can be described as relative category C R Object class, its element is called C R Object; Hom C R Can be described as C R Attitude type of penetrating, its element is called C R Attitude penetrate; Dom can be described as C R Function of region; Cod can be described as C R Last function of region; Comp can be described as synthetic that attitude penetrates.They satisfy following condition:
( c1) to arbitrarily A R , B R ∈ ob C R , Hom C R ( A R , B R ) be Hom C R A sub-category, also note is done
C ?R ?(? A ?R? ,? B ?R? )。If fC R ( A R , B R ), then dom ( f)= A R , cod ( f)= B R
( c2) to arbitrarily A R ∈ ob C R , have one i( A R ) ∈ C R ( A R , B R ), make:
( d1) if dom ( f)= A R , then comp ( f, i( A R ))= f
( d2) if cod ( f)= B R , then comp ( i( B R ), f)= f
( c3) to arbitrarily ( f, g) ∈ Hom C R * Hom C R , following equality is set up:
(? d?1?) dom?(?comp?(? f?,? g?))?=?dom?(? g?);
(? d?2?) cod?(comp?(? f?,? g?))?=?cod?(? f?)。
( c4) to arbitrarily ( f, g, h) ∈ Hom C R * Hom C R * Hom C R , following equality is set up:
comp?(? f?,?comp?(? g?,? h?))?=?comp?(?comp?(? f?,? g?)?,? h?)。
fC R ( A R , B R ) can be designated as f: A R B R Comp ( f, g) can be designated as fo g
(3) for the Internet user terminal; The inventor is on the brand-new logical foundations of its independent foundation, Fundamentals of Mathematics, scientific basic and brand-new technology basis and engineering foundation; " world " counting system that converges logical all things on earth, connects longitude and latitude for " cloud " counting system that flicker is indefinite is transformed into; Adhere to that with the GVC system be core; Introduce suitable, be used for reflecting respectively general IU network configuration system basic motive, base load, basic effect, consume basically, the various basic collaborative variablees of inner cooperation and competition and outside cooperation and competition, set up know-why and system schema that network configuration " world " is calculated.
(3. 1) need to consider is to introduce suitable, as to be used to describe general IU network configuration system macrostate preface parameter; Introduce suitable, be used to reflect the control parameter of external environment effect, and introduce suitable, be used for reflecting respectively general IU network configuration system basic motive, base load, basic effect, consume basically, the various basic collaborative variablees of inner cooperation and competition and outside cooperation and competition.
For arbitrary IU network configuration system, the preface parameter can be used as the basic variable of descriptive system macrostate.The meaning of concertedness in phase transformation is; The synergy that the subsystem association causes makes whole system become in order from unordered---the preface parameter occurred, the cooperation between the preface parameter has caused finally having only that minority preface parameter dominating system---this is the system on higher degree with competition.Synergetics research in every field by the system that big quantized system constituted, when the control parameter (energy stream, flow of material, information flow that external environment provides) of system produces the rule and the result of phase transformation in the system when reaching critical value.
Arbitrary IU network configuration system is being summed up as under the situation of resource configuration system, is supposing that this system is total NIndividual configuration node in certain resource distribution amount of confirming under the power configuration intensity of composing does M d Constantly t, resource distribution density Π d Can be as giving a definition:
Figure 2011103416922100002DEST_PATH_IMAGE092
, ρ?=?1,?2,?···,? K (?1.?42?)
Wherein, Q ρ Be ρPlant the quantity of resource allocation, KBe the kind number of resource allocation, σ d, ρ Be ρPlant the tax power configuration intensity of resource allocation.
Here, we can be with resource distribution density Π d Be elected to be to being used to describe the preface parameter of this IU network configuration system macrostate, and be referred to as collaborative state variable.
Further, for IU network configuration system, can be with preface parameter as state variable Π d Be divided into target preface parameter and actual preface parameter, note is done respectively Π d With Π d For other mark of working in coordination with variable basically of this systematic collaboration state variable and this system is united, use below x 1With x 2Representative respectively Π d With Π d , that is: x 1= Π d Collaborative status target variable (rationally collaborative state variable or non-rationally collaborative state variable) for system; x 2= Π d Collaborative state real variable for system.
The inventor considers suitably to introduce Collaborative Control parameter, the Collaborative Control factor and control trend parameter, and preliminary the discussion set up Collaborative Control factor kinetics equation.
Suppose extraneous constantly tThe resource stream that provides to this system M E Comprise energy stream M EE , flow of material M EM And information flow M EI , that is:
Figure 2011103416922100002DEST_PATH_IMAGE094
Figure 2011103416922100002DEST_PATH_IMAGE096
(?1.?43?)
Wherein, Q EE, υ For the external world provide υ E Plant the quantity of energy stream, V E Be the kind number of energy stream, σ EE, υ For the external world provide υ E Plant the tax power configuration intensity of energy stream; Q EM, υ For the external world provide υ M Plant the quantity of flow of material, V M Be the kind number of flow of material, σ EM, υ For the external world provide υ M Plant the tax power configuration intensity of flow of material; Q EI, υ For the external world provide υ I Plant the quantity of information flow, V I Be the kind number of information flow, σ EI, υ For the external world provide υ I Plant the tax power configuration intensity of information flow.
Here, we can be with the external world constantly tThe resource stream that provides to this system M E Be elected to be to being used to describe the control parameter of this IU network configuration system generation effect of outer bound pair, and be referred to as the Collaborative Control parameter.
Further, for IU network configuration system, can with as control parameter M E Be divided into target control parameter and working control parameter, note is done respectively M E With M E For other mark of working in coordination with variable basically of this systematic collaboration control parameter and this system is united, use below x 3With x 4Representative respectively M E With M E , that is:
x 3= M E Collaborative Control target variable (rationally Collaborative Control parameter or non-reasonable Collaborative Control parameter) for system;
x 4= M E Collaborative Control real variable for system.
The inventor will consider suitable drawing-in system dynamical variable, the system dynamic factor and power trend parameter, and preliminary the discussion set up system dynamic factor kinetics equation.Make hypothesis:
x 5= M d, F For satisfying the configuration active force F d The stock number that requires can be referred to as to dispose actuation variable;
x 6= M d, C Be the resource load.
Here, we can be with satisfying the configuration active force F d The stock number that requires M d, F With the resource load M d, C Be elected to be to being used for the variable of descriptive system basic motive factor, and claim that they are the system dynamic variable.
The inventor will consider suitable drawing-in system efficacy variables, the systemic effect factor and effect trend parameter, and preliminary the discussion set up systemic effect factor kinetics equation.For this reason, make hypothesis:
x 7= M d, S For satisfying system behavio(u)r S F The stock number that requires, x 8= M d, L Be system consumption.
Here, we can be with satisfying system behavio(u)r S F The stock number that requires M d, S And system consumption M d, L Be elected to be to being used for the variable of descriptive system basic effect factor, and claim that they are the systemic effect variable.
The inventor will consider suitably to introduce environmental forces variable, the environmental forces factor and environmental forces trend parameter, and preliminary the discussion set up environmental forces factor kinetics equation.For this reason, make hypothesis:
x 9= M d, EF For satisfying environmental carrying capacity E F The stock number that requires,
x 10= M d, EC For system for the formed load of environment.
Here, we can be with satisfying environmental carrying capacity E F The stock number that requires M d, EF With system for the formed load of environment M d, EC Be elected to be to being used for the variable of describe environment kinetic factor, and claim that they are the environmental forces variable.
The inventor will consider suitably to introduce environmental effect variable, the environmental effect factor and environmental effect trend parameter, and preliminary the discussion set up environmental effect factor kinetics equation.For this reason, make hypothesis:
x 11= M d, ES For satisfying the system environments effect S EF The stock number that requires, x 12= M d, EL Be system environments consumption.
Here, we can be with satisfying the system environments effect S EF The stock number that requires M d, ES With system environments consumption M d, EL Be elected to be to being used for the variable of descriptive system environmental effect factor, and claim that they are the environmental effect variable.
The inventor will consider suitably to introduce external impetus variable, the external impetus factor and external impetus trend parameter, and preliminary the discussion set up external impetus factor kinetics equation.For this reason, make hypothesis:
x 13= W SE, Γ Be outside cooperation stock number, x 14= W SE, L Be outside competitive resource amount.
Here, we can be with outside cooperation stock number W SE, Γ With outside competitive resource amount W SE, L Be elected to be to being used for the variable of descriptive system external impetus factor, and claim that they are the external impetus variable.
The inventor will consider suitably to introduce outside collaborative variable, outside cofactor and outside collaborative trend parameter, and preliminary the discussion set up outside cofactor kinetics equation.For this reason, make hypothesis:
x 15= M SE, Λ Be the concentrated of ac in outside, x 16= M SE, V For the outside disperses of ac.
Here, we can concentrate of ac with the outside M SE, Λ Disperse of ac with the outside M SE, V Be elected to be to being used for the variable of the outside co-factor of descriptive system, and claim that they are outside collaborative variable.
The inventor will consider suitably to introduce internal motivation variable, the internal motivation factor and internal motivation trend parameter, and preliminary the discussion set up internal motivation factor kinetics equation.For this reason, make hypothesis:
x 17= W S, Γ Be inner cooperation resource distribution amount, x 18= W S, L Be internal competition resource distribution amount.
Here, we can be with inner cooperation resource distribution amount W S, Γ With internal competition resource distribution amount W S, L Be elected to be to being used for the variable of descriptive system internal motivation factor, and claim that they are the internal motivation variable.
The inventor will consider suitably to introduce internal coordination variable, the internal coordination factor and internal coordination trend parameter, and preliminary the discussion set up internal coordination factor kinetics equation.Make hypothesis:
x 19= M S, Λ Be the concentrated of ac in inside, x 20= M S, V For inside disperses of ac.
Here, we can concentrate of ac with inside M S, Λ Disperse of ac with inside M S, V Be elected to be to being used for the variable of descriptive system internal coordination factor, and claim that they are the internal coordination variable.
To IU network configuration systematic collaboration variable x 2 n1 ( t) ( n=1,2,, 10) distribution, provide contain transition probability " the drift factor " as follows:
Figure 2011103416922100002DEST_PATH_IMAGE098
(?1.?44?)
And provide contain transition probability " the fluctuation factor " as follows:
Figure 2011103416922100002DEST_PATH_IMAGE100
(?1.?45?)
Wherein, k 2 n1 Be IU network configuration systematic collaboration variable x 2 n1 ( t) the trend parameter.
To IU network configuration systematic collaboration variable x 2 n ( t) ( n=1,2,, 10) distribution, provide contain transition probability " the drift factor " as follows:
Figure 2011103416922100002DEST_PATH_IMAGE102
(?1.?46?)
And provide contain transition probability " the fluctuation factor " as follows:
Figure 2011103416922100002DEST_PATH_IMAGE104
(?1.?47?)
Wherein, k 2 n Be IU network configuration systematic collaboration variable x 2 n ( t) the trend parameter.
At IU network configuration systematic collaboration variable x 2 n1 ( t) and IU network configuration systematic collaboration variable x 2 n ( t) between can introduce as follows the factor that can be described as " complete cofactor ":
Figure 2011103416922100002DEST_PATH_IMAGE106
(?1.?48? a?)
Figure 2011103416922100002DEST_PATH_IMAGE108
(?1.?48? b?)
Suppose and leaving the short time interval Δ of initial value tThe time x 2 n1 ( t) mean difference and mean square deviation with x 2 n1 ( t) mean difference and mean square deviation, be respectively through by initial condition x 2 n1 (0)= x 2 n1,0 And initial condition x 2 n (0)= x 2 n, 0 Average behind the repeat integral<>Calculate.Utilize this following result that calculates:
Figure 2011103416922100002DEST_PATH_IMAGE110
(?1.?49? a?)
Figure 2011103416922100002DEST_PATH_IMAGE112
(?1.?49? b?)
Figure 2011103416922100002DEST_PATH_IMAGE114
(?1.?50? a?)
Figure 2011103416922100002DEST_PATH_IMAGE116
(?1.?50? b?)
Now, provide the Langevin equation of following a kind of being referred to as " complete cofactor kinetics equation ":
(?1.?51? a?)
Figure 2011103416922100002DEST_PATH_IMAGE120
(?1.?51? b?)
Here supposition ξ 2 n1 ( t) and ξ 2 n ( t) be Gauss δRelated power at random supposes that promptly their correlation function does
Figure 2011103416922100002DEST_PATH_IMAGE122
Figure 2011103416922100002DEST_PATH_IMAGE124
(?1.?52? a?)
Figure 2011103416922100002DEST_PATH_IMAGE126
Figure 2011103416922100002DEST_PATH_IMAGE128
?(?1.?52? b?)
By formula (1. 48 a) and (1. 48 b), can be with formula (1. 51 a) and (1. 51 b) be written as respectively
Figure 2011103416922100002DEST_PATH_IMAGE130
(?1.?53? a?)
Figure 2011103416922100002DEST_PATH_IMAGE132
(?1.?53? b?)
The inventor attempts preliminary discussion of just general situation and sets up dynamic (dynamical) fundamental equation system of complete cofactor and model thereof, to form complete cofactor dynamic analysis basis.The new equation system that the inventor sets up at first is the combination and the unification of non-linear stochastic differential equation group and certainty constraints relation, secondly is real system function of state and combination and the unification of system mode function (or non-reasonable system mode function) on complete cofactor dynamics fundamental equation group basis rationally.Complete cofactor dynamics fundamental equation system that the inventor sets up and rationalization trend model thereof and non-rationalization trend model are new dynamic (dynamical) first kind equation systems, and it can regard the expansion of Langevin equation as.In other words, complete cofactor dynamics fundamental equation system that the inventor sets up and rationalization trend model thereof and non-rationalization trend model constitute the dynamic (dynamical) fundamental mode of the complete cofactor of complex large system jointly.
Game coordination credit based on resource distribution dynamics, the system behavio(u)r theory of value and holographic coordination is analysed in the normal form, and game tissue kinetics system should be by social organization's configuration
Figure 2011103416922100002DEST_PATH_IMAGE134
, system situation vector
Figure 2011103416922100002DEST_PATH_IMAGE136
(wherein [SS] expression inside and outside joint management relation) and trend parameter
Figure 2011103416922100002DEST_PATH_IMAGE138
(wherein tending to parametric representation does TThe various element in dimension trend space) interaction constitutes.When their coupling being discussed, must variable be regarded as through the Langevin equation
Figure 2011103416922100002DEST_PATH_IMAGE140
(?1.?38?)
Now; The whole space of dynamical variable not only comprises system's situation vector
Figure 2011103416922100002DEST_PATH_IMAGE142
and trend parameter
Figure 2011103416922100002DEST_PATH_IMAGE144
, and comprises social organization's configuration variable
Figure 2011103416922100002DEST_PATH_IMAGE146
.
As the first step of this exploration, need set up the mean value equation of modern game group's configuration
Figure 2011103416922100002DEST_PATH_IMAGE148
.For certain the Internet system, suppose that the common form of the total variable of modern game group's configuration is
Figure 2011103416922100002DEST_PATH_IMAGE150
(?1.?39?)
Here
Figure 2011103416922100002DEST_PATH_IMAGE152
is real coefficient.Again further, I divide into the complete cofactor restriction condition of total system and restriction relation system and complete cofactor restriction condition of subsystem and restriction relation system with above-mentioned complete cofactor restriction condition and restriction relation system.
Holographic coordination system anlysis framework is as shown in Figure 9.Among the figure,
Figure 2011103416922100002DEST_PATH_IMAGE154
? /?
Figure DEST_PATH_IMAGE156
forming system power relations;
? /?
Figure DEST_PATH_IMAGE160
forming system effect relationship;
Figure DEST_PATH_IMAGE162
? /?
Figure DEST_PATH_IMAGE164
form ecological dynamic relationship;
Figure DEST_PATH_IMAGE166
? /?
Figure DEST_PATH_IMAGE168
form ecological effect relationship;
Figure DEST_PATH_IMAGE170
forms the joint management structure type.
Under certain system dynamic effect restricting relation and the collaborative constraints of system organization, various configuration tissues utilize various configuration modes and various element of resource to come " driving " system situation vector to form motion.Therefore; Under certain system dynamic effect restricting relation and the collaborative constraints of system organization, should be made up of the time derivative of
Figure 100843DEST_PATH_IMAGE142
the superposition of these competition effect partial derivatives:
Figure DEST_PATH_IMAGE172
, i?=?1,?2,?,? s? (?1.?40?)
s.?t. , j?=?1,?2,?3
Wherein, a kind of effect of each expression.Generally speaking, it depends on the nonlinear interaction of system's situation vector
Figure 448779DEST_PATH_IMAGE142
, social organization's configuration
Figure 172016DEST_PATH_IMAGE146
and certain control parameter.
Equally; Representing to trend towards dynamic effect basis and the joint management relation of altering system situation vector the time derivative (it is determining the formula of transition probability) of trend parameter
Figure DEST_PATH_IMAGE176
, and also be made up of the superposition of the partial derivative with competition effect:
Figure DEST_PATH_IMAGE178
, l?=?1,?2,?,? T (?1.?41?)
Partial derivative is represented the variation of system's situation vector
Figure 847979DEST_PATH_IMAGE142
that each trend causes; The trend of this change will cause the change of social organization's configuration; The social organization's configuration that has changed conversely again flog system situation
Figure 823019DEST_PATH_IMAGE142
get into next new state, or the like.So far, in (1. 40) and (1. 41), ignored power item at random.When adding at random the power item; (1. 40) and (1. 41) have just become the Langevin equation, and have obtained being similar to the descriptive statistics to
Figure 900828DEST_PATH_IMAGE146
.
According to elementary organization's type, I am divided into five kinds of fundamental types with complex large system, concentrate and organize the cooperation type, concentrates tissue competition type, basic joint management type, dispersion tissue's cooperation type and dispersion tissue's competition type that is:.
Corresponding therewith, I divide into five kinds of fundamental types with above-mentioned complete cofactor restriction condition and restriction relation system, that is:
Concentrate complete cofactor restriction condition of cooperation type and the restriction relation system organized;
Concentrate tissue competition complete cofactor restriction condition of type and restriction relation system;
Basic complete cofactor restriction condition of joint management type and restriction relation system;
Complete cofactor restriction condition of dispersion tissue's cooperation type and restriction relation system;
Dispersion tissue's competition complete cofactor restriction condition of type and restriction relation system.
Corresponding therewith, I divide into five kinds of fundamental types, 16 main types and 81 specific types with above-mentioned complete cofactor restriction condition and restriction relation system.These 16 main types are following:
Complete cofactor restriction condition of cooperation type and restriction relation system are concentrated in the outside cooperation/inside of concentrating;
Competition complete cofactor restriction condition of type and restriction relation system are concentrated in the outside cooperation/inside of concentrating;
Outside cooperation/the inside of concentrating disperses complete cofactor restriction condition of cooperation type and restriction relation system;
Outside cooperation/the inside of concentrating disperses competition complete cofactor restriction condition of type and restriction relation system;
Complete cofactor restriction condition of cooperation type and restriction relation system are concentrated in the outside competition/inside of concentrating;
Competition complete cofactor restriction condition of type and restriction relation system are concentrated in the outside competition/inside of concentrating;
Outside competition/the inside of concentrating disperses complete cofactor restriction condition of cooperation type and restriction relation system;
Outside competition/the inside of concentrating disperses competition complete cofactor restriction condition of type and restriction relation system;
Complete cofactor restriction condition of cooperation type and restriction relation system are concentrated in the outside cooperation/inside that disperses;
Competition complete cofactor restriction condition of type and restriction relation system are concentrated in the outside cooperation/inside that disperses;
Outside cooperation/the inside that disperses disperses complete cofactor restriction condition of cooperation type and restriction relation system;
Outside cooperation/the inside that disperses disperses competition complete cofactor restriction condition of type and restriction relation system;
Complete cofactor restriction condition of cooperation type and restriction relation system are concentrated in the outside competition/inside that disperses;
Competition complete cofactor restriction condition of type and restriction relation system are concentrated in the outside competition/inside that disperses;
Outside competition/the inside that disperses disperses complete cofactor restriction condition of cooperation type and restriction relation system;
Outside competition/the inside that disperses disperses competition complete cofactor restriction condition of type and restriction relation system.
A complex large system has only the total system of a particular type in specific in a certain respect time and space; And the total system of a particular type can comprise the subsystem of five kinds of fundamental types; Or comprise the subsystem of 16 kinds of main types, or comprise the subsystem of 81 kinds of specific types.
(3. 2) according to the requirement that rationalizes, the characteristics (standard and requirement) that I calculate the network configuration world are summed up as following four aspects:
C 1. Internet user's network configuration inside and outside data securities are reliable
The network configuration world is calculated and to be provided Internet user's network configuration inside and outside the most reliable, safest data storage center, Internet user's network configuration inside and outside user again concern of data lose, trouble such as poisoning intrusion.When your document storing in the service of the network of similar Docs/HSO, when you oneself photo upload in the network album of similar Picasa Web/HSO, you just again do not worry losing or damaging of data.Because the other end in " world ", have Internet user's network configuration inside and outside, the whole world the team of specialty help your management information, have the state-of-the-art data center in Internet user's network configuration inside and outside, the whole world to help you to preserve data.Simultaneously, the strict rights management strategy in Internet user's network configuration inside and outside can help you relievedly with people's shared data of your appointment.
C 2. Internet user's network configuration inside and outside client demand are low
The network configuration world is calculated minimum to the equipment requirements of Internet user's network configuration inside and outside user side, uses also most convenient.You can directly edit the document of the other end that is stored in " world " in the browser of Internet user's network configuration inside and outside; You can be at any time and friend's sharing information and various resource; Whether Internet user's network configuration inside and outside software of again not worrying you is latest edition, again need not catch virus for Internet user's network configuration inside and outside software or document and worry.Because the other end in " world "; There is Internet user's network configuration inside and outside technical professional to help you to safeguard hardware; Help your installation and upgrade Internet user network configuration inside and outside software; Help you to take precautions against virus and disparate networks attack, help you to do all that you were done in the past on personal device (comprising computer).
The light shared data in C 3. Internet user's network configuration inside and outsides
The network configuration world is calculated the data that can easily realize between the distinct device of Internet user's network configuration inside and outside and is shared with application, not only helps people to set up informational linkage, and helps people to set up contact in kind, knowledge relationship and finance contact.The method of data synchronization of considering Internet user's network configuration inside and outside distinct device is of a great variety; Complicated operation; Will between the many different equipment in this Internet user's network configuration inside and outside, preserve and safeguard up-to-date a associated person information, you must pay millions of time and efforts for this reason.At this moment, you need calculate with the network configuration world and let all become simpler.In the dynamic remittance open network application model that calculate in the network configuration world, data have only portion, are kept at the other end in " world ", and your all electronic equipments only need connect dynamic remittance open network, just can visit and use same piece of data simultaneously.  
C 4. Internet user's network configuration inside and outsides maybe be unlimited many
Calculate in the network configuration world will provide almost unlimited many possibilities for people use network; For storage and managing internet user network configuration inside and outside data provide almost unlimited many spaces, the types of applications of also accomplishing Internet user's network configuration inside and outside for people provides almost infinitely powerful computing ability.Left the network configuration world and calculated, only used the client application on PC or the mobile phone, we be can't enjoy Internet user's network configuration inside and outside these easily.PC or other electronic equipments can not provide Internet user's network configuration inside and outside endless memory space and computing capability; But the other end in " world ", by tens thousand of of Internet user's network configuration inside and outsides in addition more the huge cluster formed of multiserver but can accomplish this point easily.The ability of individual and individual equipment is limited, but the potentiality that calculate in the network configuration world almost are unlimited.When you are placed on " world " last time to Internet user's network configuration inside and outside the most frequently used data and most important function; We believe; You have earth-shaking variation to Internet user's network configuration inside and outside hardware device, application software and even the understanding of open network of dynamically converging, and therefore your life also can change.  
The logical spirit of dynamically converging is comprehensive freedom, equality and shares.As a kind of computation model that best embodies the logical net of dynamic remittance spirit, calculate in the network configuration world will show great vitality in the near future, and will change our work and life from many aspects.No matter be the domestic consumer of Internet user's network configuration inside and outside; Or the enterprise staff of Internet user's network configuration inside and outside; No matter be the manager of Internet user's network configuration inside and outside; Still the software developer of Internet user's network configuration inside and outside, their this comprehensive and deep change that can both undergo.
(3. 3) social public organizations (comprising government) are calculated in the reply network configuration world
The network configuration world is calculated not only significant for each national ICT industry, and significant for each national all trades and professions, and the policy maker need be to this enough attention, in order to avoid miss opportunity.
In the past, government has obtained many benefits from the service of ICT Co., promoted the E-Government reform and set up and national ICT service and channel provider between partnership.But, network configuration world calculation requirement supports more comprehensively in the past that more Internet user's network configuration inside and outside software, platform or Internet user's network configuration inside and outside base frame need outsourcing.  
Calculate in the network configuration world must become the part in each national ICT industrial policy
Calculate in the network configuration world is that a scale recreation---information network inside and outside scale is the bigger the better, and the company that takes action at first will become maximum.Its scale must the immanent access in support information network inside and outside, seamless flexibility, the competitive price of connection, the quality that is continuously world service, function and safety are invested.  
The development that calculate in the network configuration world means that perhaps the relevant manufacturer in information network inside and outside must invest in advance, and its base frame must can be supported enough big capacity.The investment capacity then can have influence on the information network inside and outside market place in the service of the world in advance.  
How on earth treat the network configuration world and calculate, for government, some is faced a difficult choice.If it is transferred to market fully, a kind of situation that occurs probably is that market, information network inside and outside, native country can be inhaled into " the global world ", and native country company is degraded into the overseas factory of global main flow company; And if take the policy intervention, see also from practical term and can't really close the world.  
From the world, native country to the national world, from the national world to the global world.
Information network inside and outside policy senior executive must take into full account the network configuration world and calculate risk and the opportunity of bringing for national ICT industry and all trades and professions.On the one hand, it perhaps can bring work of information network inside and outside and data " to found the factory " abroad.On the other hand, because network configuration world counting system is global, and the difference that legal system exists between country, this just means that information network inside and outside data security and privacy concern can exist dispute or hidden danger.  
" the national world " then can solve these two problems well.At first, " the national world " will provide the information network inside and outside market opportunity for native country ICT industry and all trades and professions; In addition, government can calculate according to the demand management network configuration world of self, and the rules policy in conjunction with this country guarantees that it reaches the safety requirements of self.For medium-sized and small countries, set up and develop the global world, be the necessary ways that are on the defensive and compete with such as Amazon, Google, IBM, these IT giants of Microsoft.  
The relation of government and communication enterprise
If government wants in calculate in the network configuration world, to obtain dominant right, need work hard both ways, the one, information network inside and outside policy; The 2nd, information network inside and outside expenditure.The core part is, can guarantee the status of local enterprise in calculate in the network configuration world.  
Because the investment that calculate in the network configuration world is huge; This just means; Few of manufacturer possesses the strength with global ICT giant's competition in each country; The maximum operator in national thus information network inside and outside perhaps can be " the national world " build the optimal candidate object---they possess resources advantage at least, and generally can only pay close attention to market, national information network inside and outside.  
Certainly, government also can cooperate with global world service provider, to stimulate the development in the national world.
4, description of drawings
Fig. 1 and Fig. 2 explanation:
The holography that the inventor sets up converges leads to the technological basic framework of mathematical analysis shown in Fig. 1 and Fig. 2:
The Internet system of setting up as the inventor is intersected the element of integrated scientific analysis technical system framework, and holographic to converge logical mathematical analysis technological frame itself be a complex system with multilayer level structure.This analytical technology frame system comprises:
The holography of metasystem science converges leads to mathematics Macro or mass analysis frame system;
The holographic coordination number reason of metasystem Macro or mass analysis frame system;
The holography of metasystem science converges leads to mathematics trade-off analysis frame system.
Fig. 3 explanation:
The holographic remittance of the metasystem science that the inventor the sets up reduction of fractions to a common denominator is analysed with complete and is converged logical trade-off analysis basic procedure shown in Fig. 3.
As full remittance way system process, Internet user's network configuration of analysing based on the holography remittance reduction of fractions to a common denominator is main object with IU network configuration system problem always.And IU network configuration system has some and common linear system different features, mainly shows: non-linear, the dynamic of system of structure and the uncertainty and the incompleteness of opening and information.Characteristics in view of complicated Internet user's netconfig problem only rely on quantitative model
Be difficult to describe and find the solution complicated Internet user's netconfig problem.From Internet user's network configuration angle of analysing based on the holography remittance reduction of fractions to a common denominator, we can see that the solution procedure of complicated Internet user's netconfig problem needs the diversification model supports.According to the cognitive level of complicated Internet user's netconfig problem, this joint will propose to comprise conceptual model, structural model and Mathematical Modeling in the diversification model system of complicated Internet user's netconfig problem, and this three class model is discussed.
If Internet user network configuration person is to state space ΘInformation understand fully, can be described as and confirm type Internet user netconfig problem; To state space ΘMessage part understand, can be described as state of risk Internet user netconfig problem; To state space ΘInformation do not understand, can be described as uncertain type Internet user netconfig problem.The character of Internet user's netconfig problem is constant before information acquisition, and state of risk Internet user network configuration remains state of risk Internet user network configuration, and knowledge has increased an action that obtains complete information.
Fig. 4, Fig. 5, Fig. 6, Fig. 7 and Fig. 8 explanation:
The credit of the big system gaming coordination of Internet user's terminal intelligent is analysed basic procedure shown in Fig. 4.
The big system of Internet user's terminal intelligent external communication dynamics integrated analysis basic procedure is shown in Fig. 5.
The big system of Internet user's terminal intelligent transition process kinetics integrated analysis basic procedure is shown in Fig. 6.
The big system of Internet user's terminal intelligent outside cofactor dynamics integrated analysis basic procedure is shown in Fig. 7.
The big internal system cofactor of Internet user's terminal intelligent dynamics integrated analysis basic procedure is shown in Fig. 8.
As new wisdom systematic procedure, Internet user's network configuration of analysing based on the two poles of the earth remittance reduction of fractions to a common denominator is main object with IU network configuration system problem always.And IU network configuration system has some and common linear system different features, mainly shows: non-linear, the dynamic of system of structure and the uncertainty and the incompleteness of opening and information.Characteristics in view of complicated Internet user's netconfig problem only rely on quantitative model
Be difficult to describe and find the solution complicated Internet user's netconfig problem.From Internet user's network configuration angle of analysing based on the two poles of the earth remittance reduction of fractions to a common denominator, we can see that the solution procedure of complicated Internet user's netconfig problem needs the diversification model supports.According to the cognitive level of complicated Internet user's netconfig problem, this joint will propose to comprise conceptual model, structural model and Mathematical Modeling in the diversification model system of complicated Internet user's netconfig problem, and this three class model is discussed.
If Internet user network configuration person is to state space ΘInformation understand fully, can be described as and confirm type Internet user netconfig problem; To state space ΘMessage part understand, can be described as state of risk Internet user netconfig problem; To state space ΘInformation do not understand, can be described as uncertain type Internet user netconfig problem.The character of Internet user's netconfig problem is constant before information acquisition, and state of risk Internet user network configuration remains state of risk Internet user network configuration, and knowledge has increased an action that obtains complete information.
For certain particular organization, the task of will accomplishing be to keep pro forma consistent with its institutional framework, the intelligent integrated system of the Internet colony that institute will build also should keep pro forma consistent with them.That is to say, above the intelligent integrated network figure of definition G B Structurally be consistent with certain task of organizing and will accomplish in form.
Conceptual model is to rely on the simple abstract of people's knowledge and experience to complicated Internet user's netconfig problem, is a kind of qualitative analysis model, and it is the widest to the analysis degree of problem; Mathematical Modeling is a kind of quantitative Internet user's network configuration model, and its synthesization degree is the highest, can profoundly reflect the essence of problem, but range is not enough; Structural model is that a kind of formalization to complicated Internet user's netconfig problem is divided on the basis of conceptual model, it be qualitative analysis with quantitative integrated between the bridge that connects each other.For the understanding of complicated Internet user's netconfig problem, should there be certain depth that certain range is arranged again.This just needs above-mentioned three class models of integrated use.If be only limited to the qualitative analysis of conceptization, there is not quantitatively integrated support, the degree of depth of Internet user's network configuration analysis will be not enough.Otherwise, pursue the quantitative result of Mathematical Modeling merely, ignore the qualitative results of conceptization, the analysis of Internet user's network configuration will lack range, even lose contact with reality.Therefore, must qualitative analysis and quantitative solving be combined for finding the solution of complicated Internet user's netconfig problem.
Fig. 9 explanation:
Holographic coordination system anlysis framework is as shown in Figure 9.Among the figure,
Figure 60545DEST_PATH_IMAGE154
? /?
Figure 410755DEST_PATH_IMAGE156
forming system power relations;
Figure 173174DEST_PATH_IMAGE158
? /?
Figure 292440DEST_PATH_IMAGE160
forming system effect relationship;
Figure 685375DEST_PATH_IMAGE162
? /?
Figure 585198DEST_PATH_IMAGE164
form ecological dynamic relationship;
Figure 88992DEST_PATH_IMAGE166
? /?
Figure 62764DEST_PATH_IMAGE168
form ecological effect relationship;
Figure 688917DEST_PATH_IMAGE170
forms the joint management structure type.
Under certain system dynamic effect restricting relation and the collaborative constraints of system organization, various configuration tissues utilize various configuration modes and various element of resource to come " driving " system situation vector to form motion.
5, embodiment
Await developing the NA/UEC system of foundation, beyond doubt the huge system engineering of the inside and outside association of Internet user's network configuration.For NA/UEC; Certainly need to drop into great amount of manpower and material resources and financial resources; But what is more important needs brand-new economic science technical system and brand-new management science technical system, needs exploitation and sets up the integrated operating system of Internet user's network configuration and the dynamic open network that converges.NA/UEC is a kind of advanced person's economic science technical system, a kind of advanced management science and technology system and a kind of advanced person's the system engineering theory and practice; It involves a wide range of knowledge; Throw the National People's Congress, the implementation cycle is long, and difficulty is big; There is certain risk, need takes scientific methods to guarantee the success of the project implementation.
(5. 1) generally should be noted that following problem in force:
The top policy maker of Internet user's tissue and all stakeholder's participation.The enforcement of NA/UEC is related to the adjustment of the inside and outside associated configuration pattern of Internet user's network configuration; The variation of the inside and outside related delivery flow process of Internet user's network configuration and a large amount of personnel's changes do not have Internet user policymaker's participation will be difficult to be committed to practice.But NA/UEC is the logical and information integration of information remittance of Internet user's level simultaneously, and the participation that does not have all stakeholder also is impossible successful.
The renewal of knowledge of the inside and outside association of Internet user's network configuration.NA/UEC is the combination of information technology and advanced configuration technology; No matter be the common stakeholder of policymaker, configuration person or the inside and outside association of Internet user's network configuration of the inside and outside association of Internet user's network configuration; All GPRS computer technology, the communication technology, and they are applied in the configuration of brand-new Internet user's tissue go.
The normalized number certificate of the inside and outside association of Internet user's network configuration.NA/UEC system has realized that the overall situation of Internet user's data shares, as a configuration information system, its handle to as if data.Data normalization is the prerequisite that realizes information integration, just talk on this basis information accurate, complete sum is timely.Must exert to prepare basic data so implement NA/UEC.Such as, product data information, Rule Design merchant's information, system integrator's information, module generate merchant's information, ultimate consumer's information and social governor motion information and domestic and international relative information etc.
The delivery flow process reorganization of the inside and outside association of Internet user's network configuration and mechanism's reorganization.NA/UEC is towards the inside and outside associated item stream of Internet user's network configuration, and it has realized that the minimal redundancy of the inside and outside related information of Internet user's network configuration is with maximum shared.The task that tradition needs several steps or several department to accomplish possibly only need once just can accomplish after implementing NA/UEC system.Therefore Internet user's tissue will let NA/UEC system play a role, and is necessary recombinating aspect the delivery flow process of the inside and outside association of Internet user's network configuration and the organization, to make it to meet the enforcement requirement of NA/UEC.
NA/UEC stresses the Prior Control ability to Internet user's configuration; The operation of aspects such as front end link, rear end link, cooperation link, supporting link and human resources, system environments, decision support, but regard the organic whole of a dynamic Prior Control as.NA/UEC system combines above-mentioned each link; Its core is a configuring internet user existing resource; Rational allocation and accurately utilize existing resource, for the Internet user provide a cover can to system dynamic, systemic effect, turn of the market, network dynamically, key issue such as the CSAT DSS of carrying out real-time analysis, judgement.
NA/UEC is advanced modern internet user's configuration mode; Main objective for implementation is the Internet user of the inside and outside association of Internet user's network configuration; Purpose be with the inside and outside association of Internet user's network configuration resource (comprising physical resources, information resources, human resources and the fund) reasonable disposition of various aspects; To make it to give full play to usefulness; Make the Internet user in intense market competition, stable planning cooperation and the interactive network coordination, bring into play energy in all directions, thereby obtain optimum economic benefit.NA/UEC system has expanded the configuration scope on the basis of NA/IVC, proposed the inside and outside associated configuration architecture of new Internet user's network configuration, is organically combined togather Internet user's inside and outside resource.Here fully implemented the configuration thought of effect chain, operation activity that user's demand and Internet user is inner and external supplier's operation resource have together comprised, and have embodied fully the thought by the customer demand operation.
NA/UEC embodies a concentrated reflection of the theory and the method for brand-new Internet user's configuration, the principle of the inside and outside association of emphasis was also placed on Internet user network configuration.But NA now/UEC software is imperfection also, be far from reaching the client to requirement, even do not reach the promise that software vendor oneself are made yet.What the user needed is the more careful planning of effect chain, enforcement more flexibly; Hope that NA/UEC can not only be fit to the delivery flow process of the inside and outside association of Internet user's network configuration today; And want and can improve rapidly, adapt to the new model of the inside and outside association of Internet user's network configuration in the future.NA of today/UEC system main weakness is aspect the planning function of the inside and outside association of Internet user's network configuration; System convention design module (SRD) and resource distribution planning (RDP) module of being the inside and outside association of Internet user's network configuration need provide support with the effect chain of reinforcement to real world in time with the demand of existing resources customer in response.
Internet user's tissue is through implementing NA/UEC; Supporting engineering is to help the Internet user to set up the flow process of the inside and outside association of Internet user's network configuration; Set up the system of the inside and outside association of Internet user's network configuration; Set up the standard of the inside and outside association of Internet user's network configuration; Set up the standard of the inside and outside association of Internet user's network configuration; Guarantee control and the assurance ability of the TQC (friendship phase, quality, cost) of the inside and outside association of Internet user's network configuration, thereby improve the inside and outside associated configurations level of Internet user's network configuration, promote cooperation power, competitiveness and the coordination power of the inside and outside association of Internet user's network configuration; Promote the economic benefit of the inside and outside association of Internet user's network configuration, realize the profit maximization of the inside and outside association of Internet user's network configuration.
That is to say that if the importing of NA/UEC does not have flow process, system, standard, the standard of the inside and outside association of Internet user's network configuration to be set up supportingly, the risk that NA/UEC implements failure is just very big.Otherwise; Through implementing NA/UEC; The Internet user organizes flow process, standard, standard, the system of having set up the inside and outside association of rational Internet user's network configuration; And solidify constantly constantly and optimize that (improvement of original configuration was endless; Be the process of constantly improving), thus reach cooperation power, competitiveness and the coordination power that promotes the inside and outside association of Internet user's network configuration, realize the target of the profit maximization of the inside and outside association of Internet user's network configuration.
(5. 2) future scenarios: the enforcement of Internet user's effect chain network configuration
C 1 conceptual design
The software company that is determined should send the strongest configuration and technical specialist, gos deep into Internet user's organization internal and outside related projects link, according to the demand analysis in early stage; The all departments of the inside and outside association of research Internet user's network configuration and relevant departments' delivery flow process and problem demanding prompt solution; Propose detailed embodiment, confirm to implement step by step planning, propose the technical standard and the digital coding standard of the inside and outside association of Internet user's network configuration on this basis according to the enforcement logic of the inside and outside association of Internet user's network configuration; Implement step by step; Key breakthrough progressively launch, and relevant manager with the Internet user is fully linked up; The back both sides' affirmation of signing that reaches an agreement is with this foundation as the project implementation and examination.
C 2 organizations set up
Establishment is that each leader of functional department of group leader, the inside and outside association of Internet user's network configuration is Internet user's effect chain network configuration item order leading group of member with Rule Design merchant's policymaker, and responsible project is totally planned; Resource allocation, interagency coordination and the decision-making of the inside and outside association of Internet user's network configuration; The project recruitment evaluation of the inside and outside association of Internet user's network configuration and project configuration examination; Internet user's effect chain network configuration that foundation is director with the information-based leader of authorities advances office; By the flow process backbone of all departments of computer professional, the inside and outside association of Internet user's network configuration and the project manager of software company and implement the group that the engineer forms, the promoting comprehensively of responsible project; Be responsible to define overall plan, and the goal task in clear and definite each stage, director, deadline; Concrete organizing and implementing, the scheduling of the project of being responsible for; Be responsible for the arrangement and the typing of organization foundation data, organize configuration consulting, delivery flow definition, system testing, end user's training, the system acceptance of project simultaneously, and submit progress report to the Project Leading Group by the stage.Submit decision recommendation to and, the related work of the inside and outside associated item of Internet user's network configuration is fulfilled for significant problem for the risk that possibly the occur solution of advising.
C 3 strengthens project organization configuration
The configuration of Internet user's effect chain network is included Internet user's tissue class configuration innovation item in and is configured, and confirms phase targets, implementary plan, the rewards and punishments measure of the inside and outside association of Internet user's network configuration, formulates effective appraisal standards.
Be organized as main body with the Internet user and confirm standard process; Formulate the operational procedure of the inside and outside association of Internet user's network configuration; And to the stakeholder carry out repeatedly, targetedly the training; Carry out the qualifying examination of Internet user's effect chain network configuration operation after training finishes, with this as foundation on duty.
Carry out configuration week work regular meeting of Internet user's effect chain network and monthly work briefing system of issue.Each group of the inside and outside association of Internet user's network configuration circulates a notice of performance, asks a question in regular meeting; Solve by leading group is on-the-spot; And arrange the task of next stage; One month system performance is issued on company's internal network with the form of Internet user's effect chain network configuration bulletin, and be furnished with suitable praise and criticize content, laggard to urge on.
C 4 Internet user's effect chain network configuration item order implementary plans
According to overall planning, implement step by step, benefit drives, the principle of key breakthrough, confirms target stage by stage, by the target making planning of the inside and outside association of Internet user's network configuration.From easy to difficult, application from low to high focuses on actual effects.All the time adhere to being undertaken by planning tissue, training, data preparation, test, perfect, dry run, the step of formally reaching the standard grade.
The Internet user organizes and confirms first implementing procedure comparison standard, less the advancing, sell, deposit and the monetary items system of difficulty; Treat to implement behind the system stability of the inside and outside association of Internet user's network configuration modules such as production module and relevant with it equipment, metering, quality, implement modules such as occurrences in human life, decision-making at last again.
Organize reality based on the Internet user, confirm that whole project divides two stages to carry out:
First stage, mainly implement the inside and outside association of Internet user's network configuration system control, sell configuration, receivable configuration, logistics arrangement, deal with configuration, stock's configuration, inventory auditing, product data configurations (containing Internet user's structural arrangements, Process configuration), expense budget configuration (containing the expense configuration), monetary items accounting, PDM data preparation and demand analysis, hardware net environmental structure, Internet user's effect chain network dispose.Cycle is about 12 months.Main the integrated of inside and outside related logistics of Internet user's network configuration and cash flow, standard, the transparent configurations accomplished.
Second stage is production master program, material demand planning, power balance, workshop project configuration, quality configuration, equipment metering configuration, human resources configuration, solution analysis, the configuration of Internet user's effect chain network of the inside and outside association of integrated Internet user's network configuration.Cycle is about 16 months.Main realize the market with the inside and outside association of Internet user's network configuration be demand, with vertically and the master ga(u)ge that laterally drives divides core into, be the holographic concertedness enterprise schema of main contents with the input and output of the inside and outside association of Internet user's network configuration; Be controlled at goods effectively; Compress stock to greatest extent; Improve delivery date, satisfy market demand apace.
The overall goal of C 5 network configuration
a. to implement Internet user's effect chain network configuration item order is opportunity; Promote the Internet user by the transformation of traditional close, poor efficiency, extensive style configuration mode, the realization of support Internet user strategic objective to the configuration mode of transparent, collaborative, standard, lean.
b. strengthen Internet user's configurations.Set up the inside and outside associated data standard of Internet user's network configuration and the coding scheme of standard, promote the Internet user basis to rectify; Strengthen product design, the technical papers standard configurations of the inside and outside association of Internet user's network configuration; Dispose by norm when the raw materials consumption of the inside and outside association of refinement Internet user network configuration, man-hour, the occupation of capital, table of equipment; Internet user's standard campaign of the inside and outside association of standard Internet user's network configuration; Strengthen the customer resources information configuration of the inside and outside association of Internet user's network configuration; The cost of the inside and outside association of refinement Internet user network configuration and price configuration; Strengthen the delivery flow process and the role norm configuration of the inside and outside association of Internet user's network configuration.
c. improve configuration, decision-making technique.The IRP of the inside and outside association of realization Internet user's network configuration, the data integration of each subsystem and the database overall situation are shared; Set up Internet user's Back ground Information structure of the inside and outside association of Internet user's network configuration, comprise integrated information network and comprehensive mutual form of unified data; The neat cover stock configuration and the analysis of the inside and outside association of Internet user's network configuration; The process consuming cost of the inside and outside association of Internet user's network configuration is adjusted; The inside and outside association of Internet user's network configuration sell the configuration of risk control and customer resources on credit; Vertically reach the integrated application of the horizontal main system operation planning that drives, material demand planning, order configuration; The real-time cost accounting of the branch product of the inside and outside association of Internet user's network configuration; Fast Quotation; The profit budget and the breakeven analysis of the inside and outside association of Internet user's network configuration; Online multidimensional data analysis is supported decision application.
d. be configured to standard with Internet user's effect chain network, system improving Internet user configuration is supported the Internet user and is carried out phyletic evolution, and the Internet user who forms transparent, open, collaborative, standard, lean is cultural.
The implementation content of C 6 network configuration
a. the logistics arrangement of the inside and outside association of Internet user's network configuration.Rely on brand-new information system support; In time transmit the demand of the inside and outside related production system of Internet user's network configuration; And through with the information integration of the inside and outside related logistics system of Internet user's network configuration; Rapidly the inside and outside related demand of producing of Internet user's network configuration is made fast reaction, guarantee the Qi Taoxing of the inside and outside related production material of Internet user's network configuration.Internet user's effect chain network configuration-system proposes the inside and outside related demand planning of producing of Internet user's network configuration according to system's operation planning; The inside and outside related production system of Internet user's network configuration can propose the inside and outside related logistics arrangement planning of Internet user's network configuration according to the neat cover situation of material planning inquiry raw material and parts; Rely on the inside and outside related information of Internet user's network configuration of Internet user's effect chain network configuration-system integrated, set up the inside and outside affiliated supplier's configuration scheme of perfect Internet user's network configuration; With the foundation of information such as delivery date of the inside and outside affiliated supplier of Internet user's network configuration, article quality as supplier evaluation; Arrange the inside and outside affiliated supplier's evaluation result of Internet user's network configuration share distribution, Payments Policy to combine with logistics; Set up the inside and outside related logistics of Internet user's network configuration and arrange the information bank of configurations such as cycle, economic lot size, safety inventory, for ensureing that in time material supplies provide foundation.
b. sale, stock and the production system of the inside and outside association of Internet user's network configuration.System's operation planning is the programmatic document that instructs the inside and outside related activity in production of Internet user's network configuration.For the enforcement of safeguards system operation planning, Feed stream arrangement planning, cooperation part planning, workshop project planning, the equipment that can produce the inside and outside association of Internet user's network configuration simultaneously use a series of supporting planning such as planning, moulds of industrial equipment planning.System's operation planning and these planning are guiding principle and purpose relation, and guiding principle is lifted and could be opened by order.
c. the cost configuration of the inside and outside association of Internet user's network configuration.Production cost to the inside and outside association of Internet user's network configuration is planned, adjusts, is controlled and disposes; Set up the departmental cost budget method of the inside and outside association of Internet user's network configuration; And with thing in cost analysis compare; Make progressively department of budget, accurate, provide the data of usefulness for Internet user organizational decision making.
d. the inside and outside association of Internet user's network configuration deal with configuration.The various contact funds that the main configuring internet user of the account payable subsystem of the inside and outside association of Internet user's network configuration is taken place with supplier in running; Help Internet user configuration person to grasp the flow direction of fund effectively; Control the outflow of Internet user's fund through monitoring the payment situation, form the good circulation of circulating fund.The account payable subsystem of the inside and outside association of Internet user's network configuration is filled in invoice, tax and logistics operational costs usefulness based on logistics arrangement activity, also can directly call the order that logistics arranges subsystem to generate.Invoice amount is shared with the warehouse-in material, can confirm to put in storage material payment situation.Generate the account payable account after invoice is transferred items, payment order and account payable account are settled accounts, and confirm the received payment amount of money and the arrearage amount of money, can handle advance payment simultaneously.Organize following cash flow artificial situation in order to grasp the Internet user in real time; The system of the inside and outside association of Internet user's network configuration also provides the rich querying statistical function, and arranges subsystem, the integrated use of account subsystem with the inside and outside related logistics of Internet user's network configuration.
e. the receivable configuration of the inside and outside association of Internet user's network configuration.Internet user's tissue is through the application to Internet user's effect chain network configuration-system, and data shares the interchange of completion data message on network between the monetary items department of the inside and outside association of realization Internet user's network configuration and sales department; The income design schedule money of the monetary items portion of the inside and outside association of Internet user's network configuration will serve as according to registering with the invoice for sales of sales department; The income design schedule money of the inside and outside association of Internet user's network configuration is by collecting toward vostro account.Gathering, the invoice for sales of the inside and outside association of Internet user's network configuration has according to complying with clear and definite flow process source.The returned money clearing time can be assigned to each account due, make income design schedule age, collect the aging reflection in advance in time, accurately, not only can take in design schedule age, collect aging analysis of accounts in advance, can also carry out the returned money aging analysis of accounts.
(5. 3) following sight is summed up
The first, the not still brand-new expansion and the innovation of collocation method of the enforcement of Internet user's effect chain network configuration-system, organizational innovation, consciousness innovation and the mechanism innovation that all stakeholder participate in is a synergitic huge system engineering of holography especially.Applying under the technological and brand-new management science technology of brand-new economic science; In modern times on information technology and the integrated operating system of Internet user's network configuration and the dynamic remittance open network basis; Internet user's effect chain network configuring technical NA/UEC is guidance with the holographic coordinated management thought of metasystem science; With Internet user's effect chain market configuring technical MA/UEC and Internet user's effect chain network configuring technical NA/UEC, formation remedies each other, the relation of phase trans-substitution.Therefore, will do one's best on the implementation, directly related with inside and outside related demand of Internet user's network configuration and configuration level, not all Internet user is fit to.
The second, the enforcement of Internet user's effect chain network configuration-system is the inside and outside related engineering of integrating of Internet user's network configuration, and policymaker's fellowship that must the inside and outside association of Internet user's network configuration could continue to promote down; Want strictness follow " long-term plan, implement step by step, benefit drives, key breakthrough " principle, carry out the planning of the inside and outside association of Internet user's network configuration, have levels, in steps, target arranged, advance in proper order by the stage, can not be anxious for success; Strong organizational structures are arranged, clear and definite objectives, everyone has responsibility, guarantees project success.
The 3rd, the technical risk of Internet user's effect chain network configuration item order is little, and main concentration of risk is in the inside and outside associated configurations aspect of Internet user's network configuration.The software of the inside and outside association of all Internet user's network configuration all is based on role's the definition and the standard of flow process.Therefore, be not only the technological change of the inside and outside association of Internet user's network configuration, and be the inside and outside associated configurations innovation of Internet user's network configuration, Thought Innovation and system innovation.Internet user's effect chain network configuration-system involves a wide range of knowledge, and not only will drop into a large amount of man power and materials, also relates to Internet user's organization, a series of major transformations such as configuration system, method of work and configure base.Say in a sense, informatization be exactly to the inside and outside association of Internet user's network configuration the production, supply and sales link of human, financial, and material resources power resource and the inside and outside association of Internet user's network configuration once big innovation and the change carried out at information processing, working method, configuration mechanism and aspects such as people's idea, custom.
The 4th, Internet user's effect chain network configuration-system is implemented, and the data of the inside and outside association of Internet user's network configuration are crucial.The software of the inside and outside association of three fens Internet user's network configuration; The data of the inside and outside association of seven fens Internet user's network configuration; Accomplish " three-arrive-place ": the data of the inside and outside association of Internet user's network configuration put in place; The training of the inside and outside association of Internet user's network configuration puts in place, and the examination of the inside and outside association of Internet user's network configuration puts in place; " guarantee for one ": the new-old system of guaranteeing the inside and outside association of Internet user's network configuration steadily is connected.

Claims (7)

1. independent claims---configuration intelligent integral system-computed technical foundation is coordinated at the Internet user terminal; Be that the applicant is setting up on brand-new logical foundations, Fundamentals of Mathematics, scientific basic and brand-new technology basis and the engineering foundation; " world " counting system that converges logical all things on earth, connects longitude and latitude for " cloud " counting system that flicker is indefinite is transformed into; With Internet user is the center; And then be the center with GVC system (GVC); The connection of carrying out based on computer and network thereof with Natural Intelligence and Artificial Intelligence and coordinate the main line as general intelligence integrated system (IIS) Upgrade process is coordinated the new technology that configuration dynamics basic model and normal form put forward through setting up, and this right is characterised in that:
A, coordinate configuration intelligent integral system-computed technology for the Internet user terminal, brand-new logical foundations comprises that the holographic logical logic, the two poles of the earth of converging converge that logical logic, the two poles of the earth are holographic converges logical logic; Brand-new Fundamentals of Mathematics comprise holographic logical mathematics, the logical mathematics of the two poles of the earth remittance, the system's transition analyze mathematics of converging; Brand-new scientific basic comprises resource distribution dynamics, holographic coordination, the system behavio(u)r theory of value, game coordination, the equilibrium economics that liquidates, holographic logical physics and the perforation science (interdisciplinary science and cross-section science)---metasystem science and the intelligent integrated science that are formed by the big comprehensive of a series of brand-new theories of converging; The brand-new technology basis is is core with the value chain system, towards the synergitic brand-new systems technology of holography (cluster); Brand-new engineering foundation is is core with the value chain system, towards the synergitic brand-new system engineering of holography (cluster);
B, technological for Internet user terminal coordination configuration intelligent integral system-computed; " world " calculating itself is an extremely complicated system; Has very complicated holographic joint management structure; Here; On the one hand, various computers and infrastructure thereof, auxiliary device and the network equipment (comprising server, browser) couple together with holographic joint management pattern (comprising ICC, ICK, ICH, IDC, IDK, IDH, IMC, IMK, IMH, ECC, ECK, ECH, EDC, EDK, EDH, EMC, EMK, EMH) and form the computer interconnected network tissue; On the other hand; Various users and effect chain thereof couple together with holographic joint management pattern (comprising ICC, ICK, ICH, IDC, IDK, IDH, IMC, IMK, IMH, ECC, ECK, ECH, EDC, EDK, EDH, EMC, EMK, EMH) and form natural intelligence socialization tissue, and this natural intelligence socialization tissue and computer interconnected network tissue form according to independent claims 1 described " world " counting system CS/HSN (GII) that 1 described the present invention is censured according to independent claims jointly;
C, technological for Internet user terminal coordination configuration intelligent integral system-computed; Set up and coordinate configuration " world " principle of calculating, Fundamentals of Mathematics and master-plan framework, and then set up and coordinate logical foundations and the Fundamentals of Mathematics that configuration " world " is calculated---the holographic unifier number system that converges;
D, technological for Internet user terminal coordination configuration intelligent integral system-computed; Introduce suitable, be used for reflecting respectively general Complex Adaptive Systems basic motive, base load, basic effect, consume basically, the various basic collaborative variablees of inner cooperation and competition and outside cooperation and competition, set up and coordinate know-why and the system schema that configuration " world " is calculated.
2. dependent claims---for the Internet user terminal, 1 described the present invention sets up and coordinates configuration " world " principle of calculating and master-plan framework according to independent claims, and this right is characterised in that:
Coordinating configuration world principle of calculating can summarize as follows:
With the GVC is core; Through COMPUTER CALCULATION being distributed on a large amount of distributed computers; But not in local computer or the remote server, make the operation of the various configuration center of Internet user's exterior of terminal (physical resources configuration center, knowledge resource configuration center, the value resource configuration center relevant) get into holographic joint management process with the information resources configuration center; This makes that the Internet user coordinates to dispose the various enterprises in inside and outside can be with resource switch to the application of needs, based on demand visit information network inside and outside operational system and storage system;
The application that IU coordinates to calculate in the configuration world comprises so a kind of thought, joins together strength, coordinates to dispose each member's use of inside and outside to the Internet user;
The Internet user coordinates to dispose improvement and the expansion that inside and outside commerce services platform is the commerce services platform;
The mixing application of SAAS/HSO [IU] and MSP/HSO [IU], such is coordinated configuration world and is calculated as the interaction that the Internet user coordinates to dispose between inside and outside user and the provider platform is provided; Coordinate to dispose inside and outside individual subscriber spending management system such as the Internet user, can manage its spending and coordinate the various services of its order according to being provided with of user;
It is improvement and the expansion that the Internet is integrated that the Internet user coordinates to dispose the inside and outside integration;
Provide the company of similar service to integrate dynamically converging on the open network, can compare and select the service supplier of oneself more easily so that the Internet user coordinates to dispose the inside and outside user.
3. dependent claims is for the Internet user terminal, and 1 described the present invention sets up and coordinates the Fundamentals of Mathematics that configuration " world " is calculated according to independent claims, and this right is characterised in that:
If WThe expression Internet user coordinates configuring technical, and is right WAfter carrying out Hiberarchy Decomposition by structure and function, WStructurally can represent to become a hierarchical set
Figure DEST_PATH_RE-876446DEST_PATH_IMAGE002
(?2.?25?)
Wherein W i ( i=1,2 ..., n) be WSon technology;
The Internet user coordinates configuring technical WCarry out a hierarchical structure directed graph of Hiberarchy Decomposition by structure and function BBe defined as a doublet
?B?=?(? VD?) (?2.?26?)
Wherein
Figure DEST_PATH_RE-793586DEST_PATH_IMAGE004
Be node set, D= W* WDirected edge set for link node;
By BThe linking matrix ACan calculate WReachability matrix EPreceding nodal set (ancestor set) and follow-up nodal set (descend set)
Be BMiddle nodal set VOn two functions, they define respectively as follows:
Figure DEST_PATH_RE-635640DEST_PATH_IMAGE006
(?2.?27?)
Figure DEST_PATH_RE-30850DEST_PATH_IMAGE008
(?2.?28?)
The utilization reachability matrix E, BMiddle nodal set VCan resolve into RnIndividual stratum level V l, V 2..., V n , wherein
Figure DEST_PATH_RE-907539DEST_PATH_IMAGE010
Figure DEST_PATH_RE-792318DEST_PATH_IMAGE012
Figure DEST_PATH_RE-59352DEST_PATH_IMAGE014
Here m(≤ n) be to make Positive integer; This is called hierarchical structure (1evel-structure).
4. dependent claims---for the coordination configuration at Internet user terminal, 1 described the present invention sets up and coordinates optimum path search strategy and multiattribute that configuration " world " calculates and estimate the basis according to independent claims, and this right is characterised in that:
Coordinate layoutprocedure multistage path network for an Internet user, in each stage of finding the solution, capable of using kStage with kRelation between+1 stage is following:
Figure DEST_PATH_RE-989447DEST_PATH_IMAGE018
This recurrence relation can be described as the equation of practice process multistage optimum path search; This functional equation is to derive according to the principle of optimality of Bellman to get;
The basic thought that the Internet user coordinates layoutprocedure multistage optimum path search can be summarized as follows:
The key of multistage optimum path search; Be the application of Bellman principle of optimality, this principle is summed up as with a basic recurrence relation formula makes the continuous transfer of process, asks separating of this type problem; To be undertaken by the order of turning around, promptly begin piecemeal to starting point direction finding optimum way from terminal point;
The Internet user coordinates the expansion that layoutprocedure multistage optimum path search can be regarded as Dynamic Programming, and it comprises:
Coordinate to dispose the optimum path search (Dynamic Programming A) of tissue towards the Internet user;
Coordinate the optimum path search (Dynamic Programming B) of configuration object towards the Internet user;
Coordinate the optimum path search (Dynamic Programming C) of configuring technical towards the Internet user;
Coordinate the optimum path search (Dynamic Programming D) of configuration surroundings towards the Internet user:
If Internet user coordinate in the layoutprocedure multistage path network stage numbering and practical problem stage, sequence number was opposite the time, then can get recurrence relation and be by the method for above-mentioned Dynamic Programming optimizing approach:
Figure DEST_PATH_RE-45128DEST_PATH_IMAGE020
GThe GC group connector state;
Converge logical by the two poles of the earth a j In obtain minimum value a MinAnd maximum a Max, make its pairing subscript be respectively lWith L, promptly
a l = a Min, a L = a MaxWill P[ K] each row respectively divided by a l Pairing row,
Figure DEST_PATH_RE-799457DEST_PATH_IMAGE022
(?3.?7.?64?)
With
Figure DEST_PATH_RE-598786DEST_PATH_IMAGE024
Ask method identical, can get P l With P L P' [ k] in shared proportion
Figure DEST_PATH_RE-122171DEST_PATH_IMAGE026
With
Figure DEST_PATH_RE-614333DEST_PATH_IMAGE028
:
Figure DEST_PATH_RE-855958DEST_PATH_IMAGE030
(?3.?7.?65? a?)
Figure DEST_PATH_RE-193398DEST_PATH_IMAGE032
(?3.?7.?65? a?)
With a i Ask method identical, can obtain A MinWith A Max:
,
Figure DEST_PATH_RE-234353DEST_PATH_IMAGE036
(?3.?7.?66?)
AThe two poles of the earth converge and logically to do A= A Max/ A Min
5. dependent claims---for the coordination configuration at Internet user terminal, 1 described the present invention sets up and coordinates the holography remittance unifier number system that configuration " world " is calculated according to independent claims, and this right is characterised in that:
Define 7. 4. 5 for the logical set of holography remittance X HH , one from
Figure DEST_PATH_RE-963274DEST_PATH_IMAGE038
Arrive Y HH Mapping, can be described as the holographic logical set that converges X HH On one nN ary operation; If
Figure DEST_PATH_RE-104406DEST_PATH_IMAGE040
, then claiming should nThe logical computing of unit's remittance is sealed;
Define holographic remittance of 7. 4. 61 non-NULLs and lead to set X HH Be defined in the logical computing of remittance in this set together with several f HH, 1 , f HH, 2 ,, f HH, k The system that is formed can be described as a holographic unifier number system that converges, and note is done
<? X ?HH ?,? f ?HH,?1? ,? f ?HH,?2? ,?···,? f ?HH, k >;
Definition 7.4.15 establishes< X HH , *>Be a holographic unifier number system that converges, wherein * is defined in the holographic logical set that converges X HH On a binary operation, and eBe X HH In about the identical element of computing *; If for X HH An element aX HH An element is always arranged bX HH Satisfy b* a= e, then claim bFor X HH In about converging the left inverse element of logical computing *; If for arbitrarily aX HH An element is always arranged bX HH Satisfy a* b= e, then claim bFor X HH In about converging the right inverse of logical computing *; If for arbitrarily aX HH An element is always arranged bX HH Both satisfied a* b= e, satisfy again b* a= e, then claim bFor X HH In about converging the inverse element of logical computing *;
Absolute category of definition 7.10.10 is an absolute algebra system:
C ?A ?=?(?ob? C ?A? ,?Hom? C ?A? ,?dom?,?cod?,?comp?)
It comprises absolute type of ob C A , absolute type Hom C A With three absolute functions:
dom?:?Hom? C ?A ?→?ob? C ?A? , cod?:?Hom? C ?A ?→?ob? C ?A? ,
comp:?Hom? C ?A ?×?Hom? C ?A? →?Hom? C ?A?
Wherein,
Ob C A Can be described as absolute category C A Object class, its element is called C A Object;
Hom C A Can be described as C A Attitude type of penetrating, its element is called C A Attitude penetrate;
Dom can be described as C A Function of region;
Cod can be described as C A Last function of region;
Comp can be described as synthetic that attitude penetrates;
They satisfy following condition:
( a1) to arbitrarily A A , B A ∈ ob C A , Hom C A ( A A , B A ) be Hom C A A sub-category, also note is done C A ( A A , B A ); If fC A ( A A , B A ), then dom ( f)= A A , cod ( f)= B A
( a2) to arbitrarily A A ∈ ob C A , have one i( A A ) ∈ C A ( A A , B A ), make:
( b1) if dom ( f)= A A , then comp ( f, i( A A ))= f
( b2) if cod ( f)= B A , then comp ( i( B A ), f)= f
( a3) to arbitrarily ( f, g) ∈ Hom C A * Hom C A , following equality is set up:
(? b?1?) dom?(comp?(? f?,? g?))?=?dom?(? g?);
(? b?2?) cod?(?comp?(? f?,? g?))?=?cod?(? f?);
( a4) to arbitrarily ( f, g, h) ∈ Hom C A * Hom C A * Hom C A , following equality is set up:
comp?(? f?,?comp?(? g?,? h?))?=?comp?(comp?(? f?,? g?)?,? h?);
fC A ( A A , B A ) can be designated as f: A A B A Comp ( f, g) can be designated as fo g
Relative category of definition 7.10.15 is a relative algebraic system:
C ?R ?=?(?ob? C ?R? ,?Hom? C ?R? ,?dom?,?cod?,?comp?)
It comprises relative type of ob C R , relative type Hom C R With three relative functions:
dom?:?Hom? C ?R ?→?ob? C ?R? , cod?:?Hom? C ?R ?→?ob? C ?R? ,
comp:?Hom? C ?R ?×?Hom? C ?R? →?Hom? C ?R?
Wherein, ob C R Can be described as relative category C R Object class, its element is called C R Object; Hom C R Can be described as C R Attitude type of penetrating, its element is called C R Attitude penetrate; Dom can be described as C R Function of region; Cod can be described as C R Last function of region; Comp can be described as synthetic that attitude penetrates; They satisfy following condition:
( c1) to arbitrarily A R , B R ∈ ob C R , Hom C R ( A R , B R ) be Hom C R A sub-category, also note is done
C R ( A R , B R ); If fC R ( A R , B R ), then dom ( f)= A R , cod ( f)= B R
( c2) to arbitrarily A R ∈ ob C R , have one i( A R ) ∈ C R ( A R , B R ), make:
( d1) if dom ( f)= A R , then comp ( f, i( A R ))= f
( d2) if cod ( f)= B R , then comp ( i( B R ), f)= f
( c3) to arbitrarily ( f, g) ∈ Hom C R * Hom C R , following equality is set up:
(? d?1?) dom?(?comp?(? f?,? g?))?=?dom?(? g?);
(? d?2?) cod?(comp?(? f?,? g?))?=?cod?(? f?);
( c4) to arbitrarily ( f, g, h) ∈ Hom C R * Hom C R * Hom C R , following equality is set up:
comp?(? f?,?comp?(? g?,? h?))?=?comp?(?comp?(? f?,? g?)?,? h?);
fC R ( A R , B R ) can be designated as f: A R B R Comp ( f, g) can be designated as fo g
6. dependent claims---for the Internet user terminal, 1 described the present invention sets up and coordinates the kinetic model system that configuration " world " is calculated according to independent claims, and this right is characterised in that:
In that arbitrary IU coordination configuration-system is summed up as under the situation of resource configuration system, suppose that this system is total NIndividual configuration node in certain resource distribution amount of confirming under the power configuration intensity of composing does M d Constantly t, resource distribution density Π d Can be as giving a definition:
Figure DEST_PATH_RE-602383DEST_PATH_IMAGE042
, ρ?=?1,?2,?···,? K (?1.?42?)
Wherein, Q ρ Be ρPlant the quantity of resource allocation, KBe the kind number of resource allocation, σ d, ρ Be ρPlant the tax power configuration intensity of resource allocation;
Here, we can be with resource distribution density Π d Be elected to be to being used to and describe the preface parameter that this IU coordinates the configuration-system macrostate, and be referred to as collaborative state variable;
Suppose extraneous constantly tThe resource stream that provides to this system M E Comprise energy stream M EE , flow of material M EM And information flow M EI , that is:
Figure DEST_PATH_RE-436347DEST_PATH_IMAGE044
Figure DEST_PATH_RE-386985DEST_PATH_IMAGE046
(?1.?43?)
Wherein, Q EE, υ For the external world provide υ E Plant the quantity of energy stream, V E Be the kind number of energy stream, σ EE, υ For the external world provide υ E Plant the tax power configuration intensity of energy stream; Q EM, υ For the external world provide υ M Plant the quantity of flow of material, V M Be the kind number of flow of material, σ EM, υ For the external world provide υ M Plant the tax power configuration intensity of flow of material; Q EI, υ For the external world provide υ I Plant the quantity of information flow, V I Be the kind number of information flow, σ EI, υ For the external world provide υ I Plant the tax power configuration intensity of information flow;
Coordinate the collaborative variable of configuration-system at IU x 2 n1 ( t) and the collaborative variable of IU coordination configuration-system x 2 n ( t) between can introduce as follows the factor that can be described as " complete cofactor ":
Figure DEST_PATH_RE-331808DEST_PATH_IMAGE048
(?1.?48? a?)
Figure DEST_PATH_RE-684292DEST_PATH_IMAGE050
(?1.?48? b?)
Suppose and leaving the short time interval Δ of initial value tThe time x 2 n1 ( t) mean difference and mean square deviation with x 2 n1 ( t) mean difference and mean square deviation, be respectively through by initial condition x 2 n1 (0)= x 2 n1,0 And initial condition x 2 n (0)= x 2 n, 0 Average behind the repeat integral<>Calculate; Utilize this following result that calculates:
Figure DEST_PATH_RE-689157DEST_PATH_IMAGE052
(?1.?49? a?)
Figure DEST_PATH_RE-189408DEST_PATH_IMAGE054
(?1.?49? b?)
Figure DEST_PATH_RE-610025DEST_PATH_IMAGE056
(?1.?50? a?)
Figure DEST_PATH_RE-144912DEST_PATH_IMAGE058
(?1.?50? b?)
Now, provide the Langevin equation of following a kind of being referred to as " complete cofactor kinetics equation ":
Figure DEST_PATH_RE-258361DEST_PATH_IMAGE060
(?1.?51? a?)
Figure DEST_PATH_RE-269346DEST_PATH_IMAGE062
(?1.?51? b?)
Here supposition ξ 2 n1 ( t) and ξ 2 n ( t) be Gauss δRelated power at random;
Under certain system dynamic effect restricting relation and the collaborative constraints of system organization, various configuration tissues utilize various configuration modes and various element of resource to come " driving " system situation vector to form motion; Therefore; Under certain system dynamic effect restricting relation and the collaborative constraints of system organization, should be made up of the time derivative of
Figure DEST_PATH_RE-555971DEST_PATH_IMAGE064
the superposition of these competition effect partial derivatives:
Figure DEST_PATH_RE-617468DEST_PATH_IMAGE066
, i?=?1,?2,?,? s? (?1.?40?)
s.?t.
Figure DEST_PATH_RE-964136DEST_PATH_IMAGE068
, j?=?1,?2,?3
Wherein, a kind of effect of each expression; Generally speaking, it depends on the nonlinear interaction of system's situation vector
Figure DEST_PATH_RE-376663DEST_PATH_IMAGE064
, social organization's configuration
Figure DEST_PATH_RE-591612DEST_PATH_IMAGE070
and certain control parameter;
Equally; Representing to trend towards dynamic effect basis and the joint management relation of altering system situation vector the time derivative (it is determining the formula of transition probability) of trend parameter
Figure DEST_PATH_RE-897829DEST_PATH_IMAGE072
, and also be made up of the superposition of the partial derivative with competition effect:
Figure DEST_PATH_RE-149818DEST_PATH_IMAGE074
, l?=?1,?2,?,? T?
7. dependent claims---for the Internet user terminal, 1 described the present invention sets up and coordinates the technical scheme that configuration " world " is calculated according to independent claims.
CN2011103416922A 2011-11-02 2011-11-02 Computing technique foundation of intelligent integrated system for coordinative configuration of Internet user terminals Pending CN102655526A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011103416922A CN102655526A (en) 2011-11-02 2011-11-02 Computing technique foundation of intelligent integrated system for coordinative configuration of Internet user terminals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011103416922A CN102655526A (en) 2011-11-02 2011-11-02 Computing technique foundation of intelligent integrated system for coordinative configuration of Internet user terminals

Publications (1)

Publication Number Publication Date
CN102655526A true CN102655526A (en) 2012-09-05

Family

ID=46731049

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011103416922A Pending CN102655526A (en) 2011-11-02 2011-11-02 Computing technique foundation of intelligent integrated system for coordinative configuration of Internet user terminals

Country Status (1)

Country Link
CN (1) CN102655526A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536758A (en) * 2018-03-20 2018-09-14 中山大学 A kind of tables of data reconstructing method, the apparatus and system of database schema

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536758A (en) * 2018-03-20 2018-09-14 中山大学 A kind of tables of data reconstructing method, the apparatus and system of database schema
CN108536758B (en) * 2018-03-20 2021-09-10 中山大学 Data table reconstruction method, device and system for database mode

Similar Documents

Publication Publication Date Title
CN102624796A (en) Computing technology foundation for providing intelligent integrated system for internet user terminal market configuration
CN102655526A (en) Computing technique foundation of intelligent integrated system for coordinative configuration of Internet user terminals
CN102638509A (en) Intelligent integrated system computing technology basis for Internet user terminal planning configuration
CN102624798A (en) Computing technology basis of intelligent integrated system for planning and configuring regional value chain
CN102624811A (en) ICT technical support design for providing engineering for enterprise value chain network configuration
CN103179142A (en) Industrial value chain network configuration intelligent integrated system computing technological base
CN102710695A (en) Intelligent integrated system computing technology foundation for industry value chain market allocation
CN102651770A (en) Enterprise value chain market configuration intelligent integrated system computing technology basis
CN102710696A (en) Intelligent integrated system computing technology foundation for regional value chain network configuration
CN102624784A (en) Computing technology basis of intelligent integrated system for planning and configuring national value chain
CN102638525A (en) Intelligent integrated system computing technology basis for global value chain planning configuration
CN102710700A (en) Intelligent integrated system computing technology foundation for enterprise value chain planning allocation
CN102710692A (en) Global value chain (GVC) market allocation intelligent integrated system computer technological base
CN102752342A (en) Computing technology base of area value chain market allocation intelligent integration system
CN102724236A (en) ICT technical support design for advantage comparison of internet user terminal market allocation
CN102624805A (en) ICT technical support design for providing engineering for internet user terminal market configuration
CN103051659A (en) Computing technology base of national value chain market allocation intelligent integral system
CN103051653A (en) Computing technical basis of enterprise value chain network configuration intelligent integrated system
CN102624900A (en) ICT technical support design for transformational generation of regional value chain network configuration
CN102638515A (en) ICT technical support design for global value chain network configuration project
CN102655521A (en) Design of ICT (information communication technology) technical support of regional value chain market allocation engineering
CN102624812A (en) ICT technical support design for providing engineering foundation for global value chain market configuration
CN102739753A (en) Information and communication technology (ICT) support design generated by converting Internet user terminal coordinated configuration
CN102624810A (en) ICT technical support design for providing transformational generation for internet user terminal market configuration
CN102769648A (en) Design for providing ICT technical support for superiority comparison of internet user terminal coordination configuration

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120905