Outlier Detection Using Rough Set Theory

Size: px
Start display at page:

Download "Outlier Detection Using Rough Set Theory"

Transcription

1 Outlier Detection Using Rough Set Theory Feng Jiang 1,2, Yuefei Sui 1, and Cungen Cao 1 1 Key Laboratory of Intelligent Information Processing, Institute of Computing Technology, Chinese Academy of Sciences, Beijing , P.R. China 2 Graduate School of Chinese Academy of Sciences, Beijing , P.R. China jiangkong@163.net, {yfsui, cgcao}@ict.ac.cn Abstract. In this paper, we suggest to exploit the framework of rough set for detecting outliers individuals who behave in an unexpected way or feature abnormal properties. The ability to locate outliers can help to maintain knowledge base integrity and to single out irregular individuals. First, we formally define the notions of exceptional set and minimal exceptional set. We then analyze some special cases of exceptional set and minimal exceptional set. Finally, we introduce a new definition for outliers as well as the definition of exceptional degree. Through calculating the exceptional degree for each object in minimal exceptional sets, we can find out all outliers in a given dataset. 1 Introduction Rough set theory introduced by Z. Pawlak [1,2,3], is as an extension of set theory for the study of intelligent systems characterized by insufficient and incomplete information. It is motivated by the practical needs in classification and concept formation. The rough set philosophy is based on the assumption that with every objects of the universe there is associated a certain amount of information (data, knowledge), expressed by means of some attributes used for object description. Objects having the same description are indiscernible (similar) with respect to the available information. In recent years, there has been a fast growing interest in this theory. The successful applications of the rough set model in a variety of problems have amply demonstrated its usefulness and versatility. In this paper, we suggest a somewhat different usage of rough set. The basic idea is as follows. For any subset X of the universe and any equivalence relation on the universe, the difference between the upper and lower approximations constitutes the boundary region of the rough set, whose elements can not be characterized with certainty as belonging or not to X, using the available information (equivalence relation). The information about objects from the boundary This work is supported by the National NSF of China ( and ), the National 973 Project of China (G ), Ministry of Science and Technology (2001CCA03000) and the National Laboratory of Software Development Environment. D. Śl ezak et al. (Eds.): RSFDGrC 2005, LNAI 3642, pp , c Springer-Verlag Berlin Heidelberg 2005

2 80 F. Jiang, Y. Sui, and C. Cao region is, therefore, inconsistent or ambiguous. When given a set of equivalence relations (available information), if an object in X always lies in the boundary region with respect to every equivalence relation, then we may consider this object as not behaving normally according to the given knowledge (set of equivalence relations) at hand. We call such objects outliers. An outlier in X is an element that always can not be characterized with certainty as belonging or not to X, using the given knowledge. Recently, the detection of outlier (exception) has gained considerable interest in KDD. Outliers exist extensively in real world, and they are generated from different sources: a heavily tailed distribution or errors in inputting the data. While there is no single, generally accepted, formal definition of an outlier, Hawkins definition captures the spirit: an outlier is an observation that deviates so much from other observations as to arouse suspicions that it was generated by a different mechanism [4]. Finding outliers is important in different applications, such as credit fraud detection and network intrusion detection. Outlier detection has a long history in statistics [4, 5], but has largely focused on univariate data with a known distribution. These two limitations have restricted the ability to apply these types of methods to large real-world databases which typically have many different fields and have no easy way of characterizing the multivariate distribution of examples. Other researchers, beginning with the work by Knorr and Ng [6,7,8], have taken a non-parametric approach and proposed using an example s distance to its nearest neighbors as a measure of unusualness [9,10,11]. Eskin et al. [12], and Lane and Brodley [13] applied distance-based outliers to detecting computer intrusions from audit data. Although distance is an effective non-parametric approach to detect outliers, the drawback is the amount of computation time required. Straightforward algorithms, such as those based on nested loops, typically require O(N 2 ) distance computations. This quadratic scaling means that it will be very difficult to mine outliers as we tackle increasingly larger datasets. In this paper, we formally state the ideas briefly sketched above within the context of Pawlak s rough set theory. Our goal is to develop a new way for outlier definition and outlier detection. The remainder of this paper is organized as follows. In the next section, we present some preliminaries of rough set theory that are relevant to this paper. In Section 3, we give formal definitions of concepts of exceptional set and minimal exceptional set, and discuss basic properties about them. In Section 4, we analyze some special cases of exceptional set and minimal exceptional set. Section 5 introduces a new definition for outliers along with the definitions of exceptional degree (degree of outlier-ness). Conclusions are given in Section 6. 2 Preliminaries Let U denote a finite and nonempty set called the universe, and θ U U denote an equivalence relation on U. The pair apr =(U, θ) is called an approximation space. The equivalence relation θ partitions the set U into disjoint subsets. Such a partition of the universe is denoted by U/θ. If two elements x, y in U belong

3 Outlier Detection Using Rough Set Theory 81 to the same equivalence class, we say that x and y are indistinguishable. The equivalence classes of θ and the empty set are called the elementary or atomic sets in the approximation space. Given an arbitrary set X U, it may be impossible to describe X precisely using the equivalence classes of θ. In this case, one may characterize X by a pair of lower and upper approximations: X θ = {[x] θ :[x] θ X}, X θ = {[x] θ :[x] θ X }, where [x] θ = {y xθy} is the equivalence class containing x. The pair (X θ, X θ )is called the rough set with respect to X. The lower approximation X θ is the union of all the elementary sets which are subsets of X, and the upper approximation X θ is the union of all the elementary sets which have a nonempty intersection with X. An element in the lower approximation necessarily belongs to X, while an element in the upper approximation possibly belongs to X. 3 Exceptional Set and Minimal Exceptional Set In contrast to current methods for outlier detection, we will take a two step strategy. First, we find out all exceptional sets and minimal exceptional sets in agivendatasetx. Second, we detect all outliers in X from minimal exceptional sets of X. Here we assume that all outliers in X must belong to some minimal exceptional set of X. That is, if an object in X doesn t belong to any minimal exceptional set of X, then we can conclude that it is not an outlier of X. What we need to do is to judge whether an object from a minimal exceptional set is an outlier of X. In the rest of this paper, given a finite and nonempty universe U, we will not only consider one equivalence relation on U at one time, but also consider an amount of equivalence relations on U simultaneously, which denoted by set R = {r 1,r 2,..., r m }. First, we give the definition of exceptional set. Definition 1 [Exceptional Set]. Given an arbitrary set X U, andaset R = {r 1,r 2,..., r m } of equivalence relations on U. Lete X be a subset of X. If for every equivalence relation r i R, e Bi X, i =1, 2,..., m, thene is called an exceptional set of X with respect to R, wherebi X = BN i (X) X = X X i. X i and X i are respectively the lower approximation and the upper approximation of X with respect to r i. BN i (X) =X i X i is called the boundary of X with respect to r i. We call Bi X the inner boundary of X with respect to r i.whenx is clear from the context, we simply use B i to denote Bi X. If an exceptional set e m,thene is called a type 1 exceptional set, Bi X else e is called a type 2 exceptional set. In order to define the concept of minimal exceptional set, we give the following two definitions first.

4 82 F. Jiang, Y. Sui, and C. Cao Definition 2. Given an arbitrary set X U, andasetr = {r 1,r 2,..., r m } of equivalence relations on U. Lete X be an exceptional set of X with respect to R. For any x e, ife {x} is also an exceptional set of X with respect to R, then the element x is called dispensable in the set e with respect to R, otherwise x is indispensable. Definition 3. Let e X be an exceptional set of X with respect to R. Ifall the elements of e are indispensable in e with respect to R, then exceptional set e is called independent with respect to R, otherwise e is dependent. Now we can define minimal exceptional set as an exceptional set which is independent with respect to the corresponding set R of equivalence relations. Definition 4 [Minimal Exceptional Set]. Let e X be an exceptional set of X with respect to R. Iff = e e (e e) is an independent exceptional set of X with respect to R, thenf is called a minimal exceptional set of X with respect to R in e.weusemin(e) to denote the set of all minimal exceptional sets of X with respect to R in e. It is not difficult to prove that the exceptional set and minimal exceptional set have the following basic properties. Proposition 1. Given an arbitrary set X U, andasetr = {r 1,r 2,..., r m } of equivalence relations on U. Ife X is an exceptional set of X with respect to R, then there exists at least one minimal exceptional set f in e. Proposition 2. Given an arbitrary set X U, andasetr = {r 1,r 2,..., r m } of equivalence relations on U. Ife X is an exceptional set of X with respect to R and f is a minimal exceptional set in e, then (i) f e; (ii) f m B i,whereb i denotes the inner boundary of X with respect to equivalence relation r i, i =1, 2,..., m. Proposition 3. Let E be the set of all exceptional sets of X with respect to R and F be the set of all minimal exceptional sets of X with respect to R, denoted by F = Min(e),whereMin(e) isthesetofallminimalexceptionalsets e E in e. Then (i) F E; (ii) For any e, e X, ife E and e e čňthen e E; (iii) For any e, e X, ife / E and e e,thene/ E; (iv) For any e E, e, that is, exceptional set can not be empty; (v) For any e, e E, ife e, then all minimal exceptional sets in e are also minimal exceptional sets in e. Proposition 4. If E is the set of all exceptional sets of X with respect to R and F is the set of all minimal exceptional sets of X with respect to R, then

5 Outlier Detection Using Rough Set Theory 83 (i) For any e 1,e 2 E, e 1 e 2 E; (ii) For any e 1,e 2 F,ife 1 e 2,thene 1 e 2 / E. Proof. (i) Given any e 1,e 2 E, for every 1 i m, e 1 B i and e 2 B i, where B i denotes the inner boundary of X with respect to equivalence relation r i. Therefore for every 1 i m, (e 1 e 2 ) B i =(e 1 B i ) (e 2 B i ). So e 1 e 2 is an exceptional set of X with respect to R by Definition 1, that is, e 1 e 2 E; (ii) (Proof by contradiction) Assume that e 1 e 2 E. Sincee 1 e 2, e 1 e 2 e 1 and e 1 e 2 e 2. Therefore e 1 (e 1 e 2 ), that is, there exists a x (e 1 (e 1 e 2 )). Furthermore, e 1 F E and e 1 e 2 E. Sox is dispensable in the set e 1 with respect to R, e 1 is dependent with respect to R, thatis,e 1 is not a minimal exceptional set of X with respect to R. This contradicts with the condition e 1 F.Soife 1 e 2,thene 1 e 2 / E. Proposition 5. Given an arbitrary set X U, andasetr = {r 1,r 2,..., r m } of equivalence relations on U. LetF be the set of all minimal exceptional sets of X with respect to R and B = {B 1,B 2,..., B m } be the set of all inner boundaries of X with respect to each equivalence relations in R. The union of all minimal exceptional sets in F equals to the union of all inner boundaries in B, thatis, f = m B i. f F 4 Some Special Cases From above we can see, mostly, we get an amount of exceptional sets and minimal exceptional sets from a given X and R. In order to detect all outliers in X from these minimal exceptional sets, it is necessary to investigate some special cases of them first. At first, we define a concept of boundary degree. Definition 5 [Boundary Degree]. Given an arbitrary set X U, andaset R = {r 1,r 2,..., r m } of equivalence relations on U. LetB = {B 1,B 2,..., B m } be the set of all inner boundaries of X with respect to each equivalence relations in R. For every object x X, the number of different inner boundaries which contain x is called the boundary degree of x, denoted by Degree B(x). Then, we can consider a special kind of minimal exceptional set which contains the least elements with respect to other minimal exceptional sets. We define it as the shortest minimal exceptional set. Definition 6 [The Shortest Minimal Exceptional Set]. Given an arbitrary set X U, andasetr = {r 1,r 2,..., r m } of equivalence relations on U. LetF be the set of all minimal exceptional sets of X with respect to R. Ifthereexists a minimal exceptional set f F such that for any f F, f f, where p denotes the cardinal number of p. Thenf is called the shortest minimal exceptional set of X with respect to R.

6 84 F. Jiang, Y. Sui, and C. Cao Next, we give an algorithm which can find out the shortest minimal exceptional set of X with respect to R. Algorithm 1. Find out the shortest minimal exceptional set of X with respect to R. Input: Inner boundaries set B = {B 1,B 2,...,B m } Output: The shortest minimal exceptional set f (1) f = // Initialize f as an empty set; (2) While (B )do{ (3) For each B i B (4) For each x B i (5) Compute the boundary degree of x // Degree B(x); (6) Findanelementy which has the biggest boundary degree in all B i B (if there exist more than one such elements, Select one randomly); (7) f = f {y}; (8) Delete all the inner boundaries which contain y from B; (9) } (10) Return f. We can also define two special kinds of exceptional set the greatest exceptional set and the least exceptional set. Definition 7 [The Greatest Exceptional Set]. Given an arbitrary set X U, andasetr = {r 1,r 2,..., r m } of equivalence relations on U. IfE is the set of all exceptional sets of X with respect to R, then the union of all elements in E is called the greatest exceptional set of X with respect to R, denoted by GES R (X) = e. e E Proposition 6. The greatest exceptional set of X with respect to R is unique and equals to X itself, that is, e = X. e E Definition 8 [The Least Exceptional Set]. Given an arbitrary set X U, and a set R = {r 1,r 2,..., r m } of equivalence relations on U. LetE be the set of all exceptional sets of X with respect to R. If there exists a set l E such that for any e E, l e. Thenl is called the least exceptional set of X with respect to R. Proposition 7. Let E be the set of all exceptional sets of X with respect to R and F be the set of all minimal exceptional sets of X with respect to R. Ifl is the least exceptional set of X with respect to R, then (i) l is also a minimal exceptional set of X, thatis,l F ; (ii) l is not empty and unique; (iii) l equals to the intersection of all the elements in E, denoted by l = e. Since the least exceptional set is the intersection of all exceptional sets. But the intersection of all exceptional sets may be empty. So when do we have the least exceptional set? The next proposition gives an answer. e E

7 Outlier Detection Using Rough Set Theory 85 Proposition 8. Let E be the set of all exceptional sets of X with respect to R, andf be the set of all minimal exceptional sets of X with respect to R. If and only if there is only one element in F, the least exceptional set of X with respect to R exists, and the only element in F just is the least exceptional set. 5 Defining Outliers Most current methods for outlier detection give a binary classification of objects (data points): is or is not an outlier. In real life, it is not so simple. For many scenarios, it is more meaningful to assign to each object a degree of being an outlier. Therefore, M. M. Breunig proposed a method for identifying densitybased local outliers [14]. He defines a local outlier factor (LOF) that indicates the degree of outlier-ness of an object using only the object s neighborhood. The outlier factor of object p captures the degree to which we call p an outlier. We define two types of exceptional degree respectively for object and set. Definition 9 [Exceptional Degree of Object]. Given an arbitrary set X U, and a set R = {r 1,r 2,..., r m } of equivalence relations on U. LetB = {B 1, B 2,..., B m } be the set of all inner boundaries of X with respect to each equivalence relations in R. For any object x X, the cardinal number of set B (equals to m) divided by the boundary degree of x (namely Degree B(x)) is called the exceptional degree of x with respect to R, denoted by ED Object(x) = Degree B(x) m. Obviously, 0 ED Object(x) 1. When we have worked out the exceptional degree for all objects in minimal exceptional sets of X, it is not difficult to find out all outliers in X with respect to R. We can assume that all the objects in minimal exceptional sets whose exceptional degree is greater than a given threshold value are outliers. And the other objects in minimal exceptional sets are not outliers. Definition 10 [Outlier]. Given an arbitrary set X U, and a set R = {r 1,r 2,..., r m } of equivalence relations on U. Let F be the set of all minimal exceptional sets of X with respect to R. For any object o f,if ED Object(o) µ then object o is called an outlier in X with respect to R, where µ is a given threshold value. Definition 11 [Exceptional Degree of Set]. Given an arbitrary set X U, and a set R = {r 1,r 2,..., r m } of equivalence relations on U. For any set Y X, the sum on the exceptional degree of all objects in Y divided by the cardinal number P of Y is called the exceptional degree of set Y, denoted by ED Set(Y )= ED Object(y) y Y Y. Obviously, 0 ED Set(Y ) 1. f F

8 86 F. Jiang, Y. Sui, and C. Cao Proposition 9. Given an arbitrary set X U, andasetr = {r 1,r 2,..., r m } of equivalence relations on U. LetB = {B 1,B 2,..., B m } be the set of all inner m boundaries of X with respect to each equivalence relations in R. If B i then ED Set( m B i )=1. Proof. Since m B i,thereexistsanx m B i,thatis,foreveryb i B, x B i,wherei =1, 2,..., m. Therefore for any y m B i, Degree B(y) =m P and ED Object(y) =1.LetY = m y Y B i,thened Set(Y )= P 1 y Y Y =1.SoED Set( m B i )=1. 6 Conclusion ED Object(y) Y = Finding outliers is an important task for many KDD applications. In this paper, we present a new method for outlier defining and outlier detection. The method exploits the framework of rough set for detecting outliers. The main idea is that objects in boundary region have more likelihood of being an outlier than objects in lower approximations. There are two directions for ongoing work. The first one is to analyze the complexity of our method. The second one is to make a comparison between our method and other outlier detection methods. References 1. Pawlak, Z.: Rough sets, International Journal of Computer and Information Sciences, 11 (1982) Pawlak, Z.: Rough sets: Theoretical Aspects of Reasoning about Data, (Kluwer Academic Publishers, Dordrecht,1991) 3. Pawlak, Z., Grzymala-Busse, J.W., Slowinski, R., and Ziarko, W.: Rough sets, Comm. ACM, 38 (1995) Hawkins, D.: Identifications of Outliers, (Chapman and Hall, London, 1980) 5. Barnett, V., and Lewis, T.: Outliers in Statistical Data, (John Wiley & Sons, 1994) 6. Knorr, E., and Ng, R.: A Unified Notion of Outliers: Properties and Computation, Proc. of the Int. Conf. on Knowledge Discovery and Data Mining, (1997) Knorr, E., and Ng, R.: Algorithms for Mining Distance-based Outliers in Large Datasets, VLDB Conference Proceedings, (1998) 8. Knorr, E., and Ng, R.: Finding intensional knowledge of distance-based outliers. In Proc. of the 25th VLDB Conf., (1999) 9. Angiulli, F., and Pizzuti, C.: Fast outlier detection in high dimensional spaces, In Proc. of the Sixth European Conf. on the Principles of Data Mining and Knowledge Discovery, (2002)

9 Outlier Detection Using Rough Set Theory Ramaswamy, S., Rastogi, R., and Shim, K.: Efficient algorithms for mining outliers from large datasets. In Proc. of the ACM SIGMOD Conf., (2000) 11. Knorr, E., Ng, R. and Tucakov, V.: Distance-based outliers: algorithms and applications, VLDB Journal: Very Large Databases, 8(3-4) (2000) Eskin, E., Arnold, A., Prerau, M., Portnoy, L., and Stolfo, S.: A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data, In Data Mining for Security Applications, (2002) 13. Lane, T., and Brodley, C.E.: Temporal sequence learning and data reduction for anomaly detection, ACM Transactions on Information and System Security, 2(3) (1999) Breunig, M.M., Kriegel, H.P., Ng, R.T., and Sander, J.: LOF: Identifying densitybased local outliers, In Proc. ACM SIGMOD Conf., (2000)

Anomaly Detection via Online Oversampling Principal Component Analysis

Anomaly Detection via Online Oversampling Principal Component Analysis Anomaly Detection via Online Oversampling Principal Component Analysis R.Sundara Nagaraj 1, C.Anitha 2 and Mrs.K.K.Kavitha 3 1 PG Scholar (M.Phil-CS), Selvamm Art Science College (Autonomous), Namakkal,

More information

A Generalized Decision Logic in Interval-set-valued Information Tables

A Generalized Decision Logic in Interval-set-valued Information Tables A Generalized Decision Logic in Interval-set-valued Information Tables Y.Y. Yao 1 and Qing Liu 2 1 Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca

More information

Anomaly (outlier) detection. Huiping Cao, Anomaly 1

Anomaly (outlier) detection. Huiping Cao, Anomaly 1 Anomaly (outlier) detection Huiping Cao, Anomaly 1 Outline General concepts What are outliers Types of outliers Causes of anomalies Challenges of outlier detection Outlier detection approaches Huiping

More information

Rare Event Discovery And Event Change Point In Biological Data Stream

Rare Event Discovery And Event Change Point In Biological Data Stream Rare Event Discovery And Event Change Point In Biological Data Stream T. Jagadeeswari 1 M.Tech(CSE) MISTE, B. Mahalakshmi 2 M.Tech(CSE)MISTE, N. Anusha 3 M.Tech(CSE) Department of Computer Science and

More information

CS570 Data Mining. Anomaly Detection. Li Xiong. Slide credits: Tan, Steinbach, Kumar Jiawei Han and Micheline Kamber.

CS570 Data Mining. Anomaly Detection. Li Xiong. Slide credits: Tan, Steinbach, Kumar Jiawei Han and Micheline Kamber. CS570 Data Mining Anomaly Detection Li Xiong Slide credits: Tan, Steinbach, Kumar Jiawei Han and Micheline Kamber April 3, 2011 1 Anomaly Detection Anomaly is a pattern in the data that does not conform

More information

Interpreting Low and High Order Rules: A Granular Computing Approach

Interpreting Low and High Order Rules: A Granular Computing Approach Interpreting Low and High Order Rules: A Granular Computing Approach Yiyu Yao, Bing Zhou and Yaohua Chen Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail:

More information

Classification of Voice Signals through Mining Unique Episodes in Temporal Information Systems: A Rough Set Approach

Classification of Voice Signals through Mining Unique Episodes in Temporal Information Systems: A Rough Set Approach Classification of Voice Signals through Mining Unique Episodes in Temporal Information Systems: A Rough Set Approach Krzysztof Pancerz, Wies law Paja, Mariusz Wrzesień, and Jan Warcho l 1 University of

More information

Learning Rules from Very Large Databases Using Rough Multisets

Learning Rules from Very Large Databases Using Rough Multisets Learning Rules from Very Large Databases Using Rough Multisets Chien-Chung Chan Department of Computer Science University of Akron Akron, OH 44325-4003 chan@cs.uakron.edu Abstract. This paper presents

More information

Density-Based Clustering

Density-Based Clustering Density-Based Clustering idea: Clusters are dense regions in feature space F. density: objects volume ε here: volume: ε-neighborhood for object o w.r.t. distance measure dist(x,y) dense region: ε-neighborhood

More information

Algorithms for Characterization and Trend Detection in Spatial Databases

Algorithms for Characterization and Trend Detection in Spatial Databases Published in Proceedings of 4th International Conference on Knowledge Discovery and Data Mining (KDD-98) Algorithms for Characterization and Trend Detection in Spatial Databases Martin Ester, Alexander

More information

Hierarchical Structures on Multigranulation Spaces

Hierarchical Structures on Multigranulation Spaces Yang XB, Qian YH, Yang JY. Hierarchical structures on multigranulation spaces. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 27(6): 1169 1183 Nov. 2012. DOI 10.1007/s11390-012-1294-0 Hierarchical Structures

More information

METRIC BASED ATTRIBUTE REDUCTION IN DYNAMIC DECISION TABLES

METRIC BASED ATTRIBUTE REDUCTION IN DYNAMIC DECISION TABLES Annales Univ. Sci. Budapest., Sect. Comp. 42 2014 157 172 METRIC BASED ATTRIBUTE REDUCTION IN DYNAMIC DECISION TABLES János Demetrovics Budapest, Hungary Vu Duc Thi Ha Noi, Viet Nam Nguyen Long Giang Ha

More information

A Logical Formulation of the Granular Data Model

A Logical Formulation of the Granular Data Model 2008 IEEE International Conference on Data Mining Workshops A Logical Formulation of the Granular Data Model Tuan-Fang Fan Department of Computer Science and Information Engineering National Penghu University

More information

Anomaly Detection via Over-sampling Principal Component Analysis

Anomaly Detection via Over-sampling Principal Component Analysis Anomaly Detection via Over-sampling Principal Component Analysis Yi-Ren Yeh, Zheng-Yi Lee, and Yuh-Jye Lee Abstract Outlier detection is an important issue in data mining and has been studied in different

More information

Parameters to find the cause of Global Terrorism using Rough Set Theory

Parameters to find the cause of Global Terrorism using Rough Set Theory Parameters to find the cause of Global Terrorism using Rough Set Theory Sujogya Mishra Research scholar Utkal University Bhubaneswar-751004, India Shakti Prasad Mohanty Department of Mathematics College

More information

Rough Sets, Rough Relations and Rough Functions. Zdzislaw Pawlak. Warsaw University of Technology. ul. Nowowiejska 15/19, Warsaw, Poland.

Rough Sets, Rough Relations and Rough Functions. Zdzislaw Pawlak. Warsaw University of Technology. ul. Nowowiejska 15/19, Warsaw, Poland. Rough Sets, Rough Relations and Rough Functions Zdzislaw Pawlak Institute of Computer Science Warsaw University of Technology ul. Nowowiejska 15/19, 00 665 Warsaw, Poland and Institute of Theoretical and

More information

Drawing Conclusions from Data The Rough Set Way

Drawing Conclusions from Data The Rough Set Way Drawing Conclusions from Data The Rough et Way Zdzisław Pawlak Institute of Theoretical and Applied Informatics, Polish Academy of ciences, ul Bałtycka 5, 44 000 Gliwice, Poland In the rough set theory

More information

A new Approach to Drawing Conclusions from Data A Rough Set Perspective

A new Approach to Drawing Conclusions from Data A Rough Set Perspective Motto: Let the data speak for themselves R.A. Fisher A new Approach to Drawing Conclusions from Data A Rough et Perspective Zdzisław Pawlak Institute for Theoretical and Applied Informatics Polish Academy

More information

Computers and Mathematics with Applications

Computers and Mathematics with Applications Computers and Mathematics with Applications 59 (2010) 431 436 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: www.elsevier.com/locate/camwa A short

More information

Computational Intelligence, Volume, Number, VAGUENES AND UNCERTAINTY: A ROUGH SET PERSPECTIVE. Zdzislaw Pawlak

Computational Intelligence, Volume, Number, VAGUENES AND UNCERTAINTY: A ROUGH SET PERSPECTIVE. Zdzislaw Pawlak Computational Intelligence, Volume, Number, VAGUENES AND UNCERTAINTY: A ROUGH SET PERSPECTIVE Zdzislaw Pawlak Institute of Computer Science, Warsaw Technical University, ul. Nowowiejska 15/19,00 665 Warsaw,

More information

FUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH

FUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH FUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH M. De Cock C. Cornelis E. E. Kerre Dept. of Applied Mathematics and Computer Science Ghent University, Krijgslaan 281 (S9), B-9000 Gent, Belgium phone: +32

More information

Concept Lattices in Rough Set Theory

Concept Lattices in Rough Set Theory Concept Lattices in Rough Set Theory Y.Y. Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca URL: http://www.cs.uregina/ yyao Abstract

More information

Easy Categorization of Attributes in Decision Tables Based on Basic Binary Discernibility Matrix

Easy Categorization of Attributes in Decision Tables Based on Basic Binary Discernibility Matrix Easy Categorization of Attributes in Decision Tables Based on Basic Binary Discernibility Matrix Manuel S. Lazo-Cortés 1, José Francisco Martínez-Trinidad 1, Jesús Ariel Carrasco-Ochoa 1, and Guillermo

More information

ROUGH SETS THEORY AND DATA REDUCTION IN INFORMATION SYSTEMS AND DATA MINING

ROUGH SETS THEORY AND DATA REDUCTION IN INFORMATION SYSTEMS AND DATA MINING ROUGH SETS THEORY AND DATA REDUCTION IN INFORMATION SYSTEMS AND DATA MINING Mofreh Hogo, Miroslav Šnorek CTU in Prague, Departement Of Computer Sciences And Engineering Karlovo Náměstí 13, 121 35 Prague

More information

Mining Positive and Negative Fuzzy Association Rules

Mining Positive and Negative Fuzzy Association Rules Mining Positive and Negative Fuzzy Association Rules Peng Yan 1, Guoqing Chen 1, Chris Cornelis 2, Martine De Cock 2, and Etienne Kerre 2 1 School of Economics and Management, Tsinghua University, Beijing

More information

Multivariate Analysis of Crime Data using Spatial Outlier Detection Algorithm

Multivariate Analysis of Crime Data using Spatial Outlier Detection Algorithm J. Stat. Appl. Pro. 5, No. 3, 433-438 (2016) 433 Journal of Statistics Applications & Probability An International Journal http://dx.doi.org/10.18576/jsap/050307 Multivariate Analysis of Crime Data using

More information

Notes on Rough Set Approximations and Associated Measures

Notes on Rough Set Approximations and Associated Measures Notes on Rough Set Approximations and Associated Measures Yiyu Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca URL: http://www.cs.uregina.ca/

More information

Classification Based on Logical Concept Analysis

Classification Based on Logical Concept Analysis Classification Based on Logical Concept Analysis Yan Zhao and Yiyu Yao Department of Computer Science, University of Regina, Regina, Saskatchewan, Canada S4S 0A2 E-mail: {yanzhao, yyao}@cs.uregina.ca Abstract.

More information

Naive Bayesian Rough Sets

Naive Bayesian Rough Sets Naive Bayesian Rough Sets Yiyu Yao and Bing Zhou Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 {yyao,zhou200b}@cs.uregina.ca Abstract. A naive Bayesian classifier

More information

Minimal Attribute Space Bias for Attribute Reduction

Minimal Attribute Space Bias for Attribute Reduction Minimal Attribute Space Bias for Attribute Reduction Fan Min, Xianghui Du, Hang Qiu, and Qihe Liu School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu

More information

Rough Set Approach for Generation of Classification Rules for Jaundice

Rough Set Approach for Generation of Classification Rules for Jaundice Rough Set Approach for Generation of Classification Rules for Jaundice Sujogya Mishra 1, Shakti Prasad Mohanty 2, Sateesh Kumar Pradhan 3 1 Research scholar, Utkal University Bhubaneswar-751004, India

More information

arxiv: v1 [cs.ai] 25 Sep 2012

arxiv: v1 [cs.ai] 25 Sep 2012 Condition for neighborhoods in covering based rough sets to form a partition arxiv:1209.5480v1 [cs.ai] 25 Sep 2012 Abstract Hua Yao, William Zhu Lab of Granular Computing, Zhangzhou Normal University,

More information

Multi-criteria Anomaly Detection using Pareto Depth Analysis

Multi-criteria Anomaly Detection using Pareto Depth Analysis Multi-criteria Anomaly Detection using Pareto Depth Analysis Ko-Jen Hsiao, Kevin S. Xu, Jeff Calder, and Alfred O. Hero III University of Michigan, Ann Arbor, MI, USA 489 {coolmark,xukevin,jcalder,hero}@umich.edu

More information

Anomaly Detection. Jing Gao. SUNY Buffalo

Anomaly Detection. Jing Gao. SUNY Buffalo Anomaly Detection Jing Gao SUNY Buffalo 1 Anomaly Detection Anomalies the set of objects are considerably dissimilar from the remainder of the data occur relatively infrequently when they do occur, their

More information

Research Article Special Approach to Near Set Theory

Research Article Special Approach to Near Set Theory Mathematical Problems in Engineering Volume 2011, Article ID 168501, 10 pages doi:10.1155/2011/168501 Research Article Special Approach to Near Set Theory M. E. Abd El-Monsef, 1 H. M. Abu-Donia, 2 and

More information

Data Analysis - the Rough Sets Perspective

Data Analysis - the Rough Sets Perspective Data Analysis - the Rough ets Perspective Zdzisław Pawlak Institute of Computer cience Warsaw University of Technology 00-665 Warsaw, Nowowiejska 15/19 Abstract: Rough set theory is a new mathematical

More information

Bhubaneswar , India 2 Department of Mathematics, College of Engineering and

Bhubaneswar , India 2 Department of Mathematics, College of Engineering and www.ijcsi.org 136 ROUGH SET APPROACH TO GENERATE CLASSIFICATION RULES FOR DIABETES Sujogya Mishra 1, Shakti Prasad Mohanty 2, Sateesh Kumar Pradhan 3 1 Research scholar, Utkal University Bhubaneswar-751004,

More information

Comparison of Rough-set and Interval-set Models for Uncertain Reasoning

Comparison of Rough-set and Interval-set Models for Uncertain Reasoning Yao, Y.Y. and Li, X. Comparison of rough-set and interval-set models for uncertain reasoning Fundamenta Informaticae, Vol. 27, No. 2-3, pp. 289-298, 1996. Comparison of Rough-set and Interval-set Models

More information

An algorithm for induction of decision rules consistent with the dominance principle

An algorithm for induction of decision rules consistent with the dominance principle An algorithm for induction of decision rules consistent with the dominance principle Salvatore Greco 1, Benedetto Matarazzo 1, Roman Slowinski 2, Jerzy Stefanowski 2 1 Faculty of Economics, University

More information

Some remarks on conflict analysis

Some remarks on conflict analysis European Journal of Operational Research 166 (2005) 649 654 www.elsevier.com/locate/dsw Some remarks on conflict analysis Zdzisław Pawlak Warsaw School of Information Technology, ul. Newelska 6, 01 447

More information

Rough Set Model Selection for Practical Decision Making

Rough Set Model Selection for Practical Decision Making Rough Set Model Selection for Practical Decision Making Joseph P. Herbert JingTao Yao Department of Computer Science University of Regina Regina, Saskatchewan, Canada, S4S 0A2 {herbertj, jtyao}@cs.uregina.ca

More information

Mining Approximative Descriptions of Sets Using Rough Sets

Mining Approximative Descriptions of Sets Using Rough Sets Mining Approximative Descriptions of Sets Using Rough Sets Dan A. Simovici University of Massachusetts Boston, Dept. of Computer Science, 100 Morrissey Blvd. Boston, Massachusetts, 02125 USA dsim@cs.umb.edu

More information

Streaming multiscale anomaly detection

Streaming multiscale anomaly detection Streaming multiscale anomaly detection DATA-ENS Paris and ThalesAlenia Space B Ravi Kiran, Université Lille 3, CRISTaL Joint work with Mathieu Andreux beedotkiran@gmail.com June 20, 2017 (CRISTaL) Streaming

More information

On Improving the k-means Algorithm to Classify Unclassified Patterns

On Improving the k-means Algorithm to Classify Unclassified Patterns On Improving the k-means Algorithm to Classify Unclassified Patterns Mohamed M. Rizk 1, Safar Mohamed Safar Alghamdi 2 1 Mathematics & Statistics Department, Faculty of Science, Taif University, Taif,

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

Partial Approximative Set Theory: A Generalization of the Rough Set Theory

Partial Approximative Set Theory: A Generalization of the Rough Set Theory International Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150-7988 Volume 4 (2012) pp. 437-444 c MIR Labs, www.mirlabs.net/ijcisim/index.html Partial Approximative

More information

Feature Selection with Fuzzy Decision Reducts

Feature Selection with Fuzzy Decision Reducts Feature Selection with Fuzzy Decision Reducts Chris Cornelis 1, Germán Hurtado Martín 1,2, Richard Jensen 3, and Dominik Ślȩzak4 1 Dept. of Mathematics and Computer Science, Ghent University, Gent, Belgium

More information

Bulletin of the Transilvania University of Braşov Vol 10(59), No Series III: Mathematics, Informatics, Physics, 67-82

Bulletin of the Transilvania University of Braşov Vol 10(59), No Series III: Mathematics, Informatics, Physics, 67-82 Bulletin of the Transilvania University of Braşov Vol 10(59), No. 1-2017 Series III: Mathematics, Informatics, Physics, 67-82 IDEALS OF A COMMUTATIVE ROUGH SEMIRING V. M. CHANDRASEKARAN 3, A. MANIMARAN

More information

An Overview of Outlier Detection Techniques and Applications

An Overview of Outlier Detection Techniques and Applications Machine Learning Rhein-Neckar Meetup An Overview of Outlier Detection Techniques and Applications Ying Gu connygy@gmail.com 28.02.2016 Anomaly/Outlier Detection What are anomalies/outliers? The set of

More information

Some Properties of a Set-valued Homomorphism on Modules

Some Properties of a Set-valued Homomorphism on Modules 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Some Properties of a Set-valued Homomorphism on Modules S.B. Hosseini 1, M. Saberifar 2 1 Department

More information

Rough Approach to Fuzzification and Defuzzification in Probability Theory

Rough Approach to Fuzzification and Defuzzification in Probability Theory Rough Approach to Fuzzification and Defuzzification in Probability Theory G. Cattaneo and D. Ciucci Dipartimento di Informatica, Sistemistica e Comunicazione Università di Milano Bicocca, Via Bicocca degli

More information

HW 4 SOLUTIONS. , x + x x 1 ) 2

HW 4 SOLUTIONS. , x + x x 1 ) 2 HW 4 SOLUTIONS The Way of Analysis p. 98: 1.) Suppose that A is open. Show that A minus a finite set is still open. This follows by induction as long as A minus one point x is still open. To see that A

More information

On the Impossibility of Certain Ranking Functions

On the Impossibility of Certain Ranking Functions On the Impossibility of Certain Ranking Functions Jin-Yi Cai Abstract Suppose all the individuals in a field are linearly ordered. Groups of individuals form teams. Is there a perfect ranking function

More information

A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description

A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description Min Yang, HuanGuo Zhang, JianMing Fu, and Fei Yan School of Computer, State Key Laboratory of Software Engineering, Wuhan

More information

The Fourth International Conference on Innovative Computing, Information and Control

The Fourth International Conference on Innovative Computing, Information and Control The Fourth International Conference on Innovative Computing, Information and Control December 7-9, 2009, Kaohsiung, Taiwan http://bit.kuas.edu.tw/~icic09 Dear Prof. Yann-Chang Huang, Thank you for your

More information

The small ball property in Banach spaces (quantitative results)

The small ball property in Banach spaces (quantitative results) The small ball property in Banach spaces (quantitative results) Ehrhard Behrends Abstract A metric space (M, d) is said to have the small ball property (sbp) if for every ε 0 > 0 there exists a sequence

More information

Towards a More Physically Adequate Definition of Randomness: A Topological Approach

Towards a More Physically Adequate Definition of Randomness: A Topological Approach University of Texas at El Paso DigitalCommons@UTEP Departmental Technical Reports (CS) Department of Computer Science 8-1-2007 Towards a More Physically Adequate Definition of Randomness: A Topological

More information

Focusing on a Probability Element: Parameter Selection of Message Importance Measure in Big Data

Focusing on a Probability Element: Parameter Selection of Message Importance Measure in Big Data Focusing on a Probability Element: Parameter Selection of Message Importance Measure in Big Data arxiv:1701.03234v2 [cs.it] 11 Nov 2018 Rui She, Shanyun Liu, Yunquan Dong, and Pingyi Fan, SeniorMember,

More information

Similarity-based Classification with Dominance-based Decision Rules

Similarity-based Classification with Dominance-based Decision Rules Similarity-based Classification with Dominance-based Decision Rules Marcin Szeląg, Salvatore Greco 2,3, Roman Słowiński,4 Institute of Computing Science, Poznań University of Technology, 60-965 Poznań,

More information

Iterative Laplacian Score for Feature Selection

Iterative Laplacian Score for Feature Selection Iterative Laplacian Score for Feature Selection Linling Zhu, Linsong Miao, and Daoqiang Zhang College of Computer Science and echnology, Nanjing University of Aeronautics and Astronautics, Nanjing 2006,

More information

Home Page. Title Page. Page 1 of 35. Go Back. Full Screen. Close. Quit

Home Page. Title Page. Page 1 of 35. Go Back. Full Screen. Close. Quit JJ II J I Page 1 of 35 General Attribute Reduction of Formal Contexts Tong-Jun Li Zhejiang Ocean University, China litj@zjou.edu.cn September, 2011,University of Milano-Bicocca Page 2 of 35 Objective of

More information

Three Discretization Methods for Rule Induction

Three Discretization Methods for Rule Induction Three Discretization Methods for Rule Induction Jerzy W. Grzymala-Busse, 1, Jerzy Stefanowski 2 1 Department of Electrical Engineering and Computer Science, University of Kansas, Lawrence, Kansas 66045

More information

Rough Sets for Uncertainty Reasoning

Rough Sets for Uncertainty Reasoning Rough Sets for Uncertainty Reasoning S.K.M. Wong 1 and C.J. Butz 2 1 Department of Computer Science, University of Regina, Regina, Canada, S4S 0A2, wong@cs.uregina.ca 2 School of Information Technology

More information

Rough operations on Boolean algebras

Rough operations on Boolean algebras Rough operations on Boolean algebras Guilin Qi and Weiru Liu School of Computer Science, Queen s University Belfast Belfast, BT7 1NN, UK Abstract In this paper, we introduce two pairs of rough operations

More information

REDUCTS AND ROUGH SET ANALYSIS

REDUCTS AND ROUGH SET ANALYSIS REDUCTS AND ROUGH SET ANALYSIS A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES AND RESEARCH IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE UNIVERSITY

More information

CRITERIA REDUCTION OF SET-VALUED ORDERED DECISION SYSTEM BASED ON APPROXIMATION QUALITY

CRITERIA REDUCTION OF SET-VALUED ORDERED DECISION SYSTEM BASED ON APPROXIMATION QUALITY International Journal of Innovative omputing, Information and ontrol II International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2393 2404 RITERI REDUTION OF SET-VLUED ORDERED DEISION SYSTEM

More information

A NOVEL VIEW OF ROUGH SOFT SEMIGROUPS BASED ON FUZZY IDEALS. Qiumei Wang Jianming Zhan Introduction

A NOVEL VIEW OF ROUGH SOFT SEMIGROUPS BASED ON FUZZY IDEALS. Qiumei Wang Jianming Zhan Introduction italian journal of pure and applied mathematics n. 37 2017 (673 686) 673 A NOVEL VIEW OF ROUGH SOFT SEMIGROUPS BASED ON FUZZY IDEALS Qiumei Wang Jianming Zhan 1 Department of Mathematics Hubei University

More information

Fuzzy Rough Sets with GA-Based Attribute Division

Fuzzy Rough Sets with GA-Based Attribute Division Fuzzy Rough Sets with GA-Based Attribute Division HUGANG HAN, YOSHIO MORIOKA School of Business, Hiroshima Prefectural University 562 Nanatsuka-cho, Shobara-shi, Hiroshima 727-0023, JAPAN Abstract: Rough

More information

Knowledge Discovery. Zbigniew W. Ras. Polish Academy of Sciences, Dept. of Comp. Science, Warsaw, Poland

Knowledge Discovery. Zbigniew W. Ras. Polish Academy of Sciences, Dept. of Comp. Science, Warsaw, Poland Handling Queries in Incomplete CKBS through Knowledge Discovery Zbigniew W. Ras University of orth Carolina, Dept. of Comp. Science, Charlotte,.C. 28223, USA Polish Academy of Sciences, Dept. of Comp.

More information

FUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH

FUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH FUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH M. De Cock C. Cornelis E. E. Kerre Dept. of Applied Mathematics and Computer Science Ghent University, Krijgslaan 281 (S9), B-9000 Gent, Belgium phone: +32

More information

ON SOME PROPERTIES OF ROUGH APPROXIMATIONS OF SUBRINGS VIA COSETS

ON SOME PROPERTIES OF ROUGH APPROXIMATIONS OF SUBRINGS VIA COSETS ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS N. 39 2018 (120 127) 120 ON SOME PROPERTIES OF ROUGH APPROXIMATIONS OF SUBRINGS VIA COSETS Madhavi Reddy Research Scholar, JNIAS Budhabhavan, Hyderabad-500085

More information

ARTICLE IN PRESS. Information Sciences xxx (2016) xxx xxx. Contents lists available at ScienceDirect. Information Sciences

ARTICLE IN PRESS. Information Sciences xxx (2016) xxx xxx. Contents lists available at ScienceDirect. Information Sciences Information Sciences xxx (2016) xxx xxx Contents lists available at ScienceDirect Information Sciences journal homepage: www.elsevier.com/locate/ins Three-way cognitive concept learning via multi-granularity

More information

Fundamentals of Probability CE 311S

Fundamentals of Probability CE 311S Fundamentals of Probability CE 311S OUTLINE Review Elementary set theory Probability fundamentals: outcomes, sample spaces, events Outline ELEMENTARY SET THEORY Basic probability concepts can be cast in

More information

Available online at ScienceDirect. Procedia Computer Science 96 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 96 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 96 (2016 ) 139 146 20th International Conference on Knowledge Based and Intelligent Information and Engineering Systems

More information

Discriminative Learning can Succeed where Generative Learning Fails

Discriminative Learning can Succeed where Generative Learning Fails Discriminative Learning can Succeed where Generative Learning Fails Philip M. Long, a Rocco A. Servedio, b,,1 Hans Ulrich Simon c a Google, Mountain View, CA, USA b Columbia University, New York, New York,

More information

ARPN Journal of Science and Technology All rights reserved.

ARPN Journal of Science and Technology All rights reserved. Rule Induction Based On Boundary Region Partition Reduction with Stards Comparisons Du Weifeng Min Xiao School of Mathematics Physics Information Engineering Jiaxing University Jiaxing 34 China ABSTRACT

More information

TOPOLOGICAL ASPECTS OF YAO S ROUGH SET

TOPOLOGICAL ASPECTS OF YAO S ROUGH SET Chapter 5 TOPOLOGICAL ASPECTS OF YAO S ROUGH SET In this chapter, we introduce the concept of transmissing right neighborhood via transmissing expression of a relation R on domain U, and then we study

More information

Rough Set Approaches for Discovery of Rules and Attribute Dependencies

Rough Set Approaches for Discovery of Rules and Attribute Dependencies Rough Set Approaches for Discovery of Rules and Attribute Dependencies Wojciech Ziarko Department of Computer Science University of Regina Regina, SK, S4S 0A2 Canada Abstract The article presents an elementary

More information

Sets with Partial Memberships A Rough Set View of Fuzzy Sets

Sets with Partial Memberships A Rough Set View of Fuzzy Sets Sets with Partial Memberships A Rough Set View of Fuzzy Sets T. Y. Lin Department of Mathematics and Computer Science San Jose State University San Jose, California 95192-0103 E-mail: tylin@cs.sjsu.edu

More information

Probabilistic Bisimilarity as Testing Equivalence

Probabilistic Bisimilarity as Testing Equivalence Probabilistic Bisimilarity as Testing Equivalence Yuxin Deng a,, Yuan Feng b a Shanghai Key Laboratory of Trustworthy Computing, MOE International Joint Lab of Trustworthy Software, and International Research

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 969 Soft Generalized Separation Axioms in Soft Generalized Topological Spaces Jyothis Thomas and Sunil Jacob John

More information

FUZZY PARTITIONS II: BELIEF FUNCTIONS A Probabilistic View T. Y. Lin

FUZZY PARTITIONS II: BELIEF FUNCTIONS A Probabilistic View T. Y. Lin FUZZY PARTITIONS II: BELIEF FUNCTIONS A Probabilistic View T. Y. Lin Department of Mathematics and Computer Science, San Jose State University, San Jose, California 95192, USA tylin@cs.sjsu.edu 1 Introduction

More information

Unsupervised Anomaly Detection for High Dimensional Data

Unsupervised Anomaly Detection for High Dimensional Data Unsupervised Anomaly Detection for High Dimensional Data Department of Mathematics, Rowan University. July 19th, 2013 International Workshop in Sequential Methodologies (IWSM-2013) Outline of Talk Motivation

More information

Unsupervised Ensemble Learning for Mining Top-n Outliers

Unsupervised Ensemble Learning for Mining Top-n Outliers Unsupervised Ensemble Learning for Mining Top-n Outliers Jun Gao 1,WeimingHu 1, Zhongfei(Mark) Zhang 2,andOuWu 1 1 National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of

More information

ROUGH SET THEORY FOR INTELLIGENT INDUSTRIAL APPLICATIONS

ROUGH SET THEORY FOR INTELLIGENT INDUSTRIAL APPLICATIONS ROUGH SET THEORY FOR INTELLIGENT INDUSTRIAL APPLICATIONS Zdzisław Pawlak Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Poland, e-mail: zpw@ii.pw.edu.pl ABSTRACT Application

More information

Math 541 Fall 2008 Connectivity Transition from Math 453/503 to Math 541 Ross E. Staffeldt-August 2008

Math 541 Fall 2008 Connectivity Transition from Math 453/503 to Math 541 Ross E. Staffeldt-August 2008 Math 541 Fall 2008 Connectivity Transition from Math 453/503 to Math 541 Ross E. Staffeldt-August 2008 Closed sets We have been operating at a fundamental level at which a topological space is a set together

More information

ROUGHNESS IN MODULES BY USING THE NOTION OF REFERENCE POINTS

ROUGHNESS IN MODULES BY USING THE NOTION OF REFERENCE POINTS Iranian Journal of Fuzzy Systems Vol. 10, No. 6, (2013) pp. 109-124 109 ROUGHNESS IN MODULES BY USING THE NOTION OF REFERENCE POINTS B. DAVVAZ AND A. MALEKZADEH Abstract. A module over a ring is a general

More information

The Fixed String of Elementary Cellular Automata

The Fixed String of Elementary Cellular Automata The Fixed String of Elementary Cellular Automata Jiang Zhisong Department of Mathematics East China University of Science and Technology Shanghai 200237, China zsjiang@ecust.edu.cn Qin Dakang School of

More information

Text Mining. Dr. Yanjun Li. Associate Professor. Department of Computer and Information Sciences Fordham University

Text Mining. Dr. Yanjun Li. Associate Professor. Department of Computer and Information Sciences Fordham University Text Mining Dr. Yanjun Li Associate Professor Department of Computer and Information Sciences Fordham University Outline Introduction: Data Mining Part One: Text Mining Part Two: Preprocessing Text Data

More information

Transversal and Function Matroidal Structures of Covering-Based Rough Sets

Transversal and Function Matroidal Structures of Covering-Based Rough Sets Transversal and Function Matroidal Structures of Covering-Based Rough Sets Shiping Wang 1, William Zhu 2,,andFanMin 2 1 School of Mathematical Sciences, University of Electronic Science and Technology

More information

4. Conclusions. Acknowledgments. 5. References

4. Conclusions. Acknowledgments. 5. References fluence region and the theoretical circular region. These areas coincide with the highways originating from Munich.. figure 5: Difference between the observed and the theoretical influence region of Munich

More information

A Novel Approach for Outlier Detection using Rough Entropy

A Novel Approach for Outlier Detection using Rough Entropy A Novel Approach for Outlier Detection using Rough Entropy E.N.SATHISHKUMAR, K.THANGAVEL Department of Computer Science Periyar University Salem - 011, Tamilnadu INDIA en.sathishkumar@yahoo.in Abstract:

More information

Detecting Region Outliers in Meteorological Data

Detecting Region Outliers in Meteorological Data Detecting Region Outliers in Meteorological Data Jiang Zhao, Chang-Tien Lu, Yufeng Kou Department of Computer Science Virginia Polytechnic Institute and State University 7054 Haycock Road, Falls Church,

More information

Anomaly Detection via Online Over-Sampling Principal Component Analysis

Anomaly Detection via Online Over-Sampling Principal Component Analysis Anomaly Detection via Online Over-Sampling Principal Component Analysis Yi-Ren Yeh 1, Yuh-Jye Lee 2 and Yu-Chiang Frank Wang 1 1 Research Center for Information Technology Innovation, Academia Sinica 2

More information

Invertible insertion and deletion operations

Invertible insertion and deletion operations Invertible insertion and deletion operations Lila Kari Academy of Finland and Department of Mathematics 1 University of Turku 20500 Turku Finland Abstract The paper investigates the way in which the property

More information

SOME TRANSFINITE INDUCTION DEDUCTIONS

SOME TRANSFINITE INDUCTION DEDUCTIONS SOME TRANSFINITE INDUCTION DEDUCTIONS SYLVIA DURIAN Abstract. This paper develops the ordinal numbers and transfinite induction, then demonstrates some interesting applications of transfinite induction.

More information

COMPLETELY INVARIANT JULIA SETS OF POLYNOMIAL SEMIGROUPS

COMPLETELY INVARIANT JULIA SETS OF POLYNOMIAL SEMIGROUPS Series Logo Volume 00, Number 00, Xxxx 19xx COMPLETELY INVARIANT JULIA SETS OF POLYNOMIAL SEMIGROUPS RICH STANKEWITZ Abstract. Let G be a semigroup of rational functions of degree at least two, under composition

More information

P leiades: Subspace Clustering and Evaluation

P leiades: Subspace Clustering and Evaluation P leiades: Subspace Clustering and Evaluation Ira Assent, Emmanuel Müller, Ralph Krieger, Timm Jansen, and Thomas Seidl Data management and exploration group, RWTH Aachen University, Germany {assent,mueller,krieger,jansen,seidl}@cs.rwth-aachen.de

More information

ROUGH NEUTROSOPHIC SETS. Said Broumi. Florentin Smarandache. Mamoni Dhar. 1. Introduction

ROUGH NEUTROSOPHIC SETS. Said Broumi. Florentin Smarandache. Mamoni Dhar. 1. Introduction italian journal of pure and applied mathematics n. 32 2014 (493 502) 493 ROUGH NEUTROSOPHIC SETS Said Broumi Faculty of Arts and Humanities Hay El Baraka Ben M sik Casablanca B.P. 7951 Hassan II University

More information

Concepts of a Discrete Random Variable

Concepts of a Discrete Random Variable Concepts of a Discrete Random Variable Richard Emilion Laboratoire MAPMO, Université d Orléans, B.P. 6759 45067 Orléans Cedex 2, France, richard.emilion@univ-orleans.fr Abstract. A formal concept is defined

More information