Investigating Measures of Association by Graphs and Tables of Critical Frequencies

Size: px
Start display at page:

Download "Investigating Measures of Association by Graphs and Tables of Critical Frequencies"

Transcription

1 Investigating Measures of Association by Graphs Investigating and Tables Measures of Critical of Association Frequencies by Graphs and Tables of Critical Frequencies Martin Ralbovský, Jan Rauch University Martin Ralbovský, of Economics, Jan Prague Rauch W. Churchill Sq. 4, Praha 3, Czech Republic University of Economics, Prague, W. Churchill Sq. 4, Praha 3, Czech Republic Abstract. There is lot of effort to find suitable measures of interestingness of association rules. The most known measures are confidence and support but there are tens of additional ones. Each association measure can be understood as a function of four independent variables. These variables correspond to frequencies from a fourfold contingency table of antecedent and succedent. A natural way to investigate functions is to study their graphs. However it is hard to deal with graphs of functions of four independent variables; thus graphs are generally not suitable to study association measures. We show that tables of critical frequencies can be used to overcome this difficulty for some important classes of association measures. We give an overview of important classes of association measures and then we show how the graphs of tables of critical frequencies describe behavior of corresponding association measures in a reasonable way. 1 Introduction There are lot of papers dealing with various aspects of association measures; see e.g. [5 7]. The goal is to find optimal criterion of truthfulness of the association rule ϕ ψ expressing a relation of Boolean attributes ϕ and ψ in given data. We suppose to have data matrix M with two Boolean columns corresponding to ϕ and ψ. Both ϕ and ψ can be derived from the other, usually non Boolean, columns. The whole situation is fully described by the four-fold contingency table 4ft(ϕ, ψ, M) (the 4ft table for short) of ϕ and ψ in the data matrix M. It is the quadruple a, b, c, d of natural numbers such that a is the number of rows of M satisfying both ϕ and ψ, b is the number of rows of M satisfying ϕ and not satisfying ψ etc.; see Table 1. Table 1. 4ft table 4ft(ϕ, ψ, M) of ϕ and ψ in M M ψ ψ ϕ a b ϕ c d c Václav Snášel (Ed.): Znalosti 2008, pp , ISBN FIIT STU Bratislava, Ústav informatiky a softvérového inžinierstva, 2008.

2 172 Martin Ralbovský, Jan Rauch There are various requirements concerning relation of ϕ and ψ. We can try to express the classical association rule with confidence and support, some relation described by a simple condition concerning frequencies a, b, c, d from the 4ft table 4ft(ϕ, ψ, M) or even a relation corresponding to a statistical hypothesis test. We call the symbol as 4ft-quantifier [11]. The truthfulness of the rule ϕ ψ in data matrix M is often defined such that ϕ ψ is true if and only if F (a, b, c, d) p or F (a, b, c, d) p where a, b, c, d = 4ft(ϕ, ψ, M). The function F and the parameter p are given by the 4ft-quantifier. We call the function F the evaluation function of 4ft-quantifier. Examples of 4ftquantifiers and their evaluation functions are in section 2. Properties of the 4ft-quantifier are fully described by behavior of its evaluation function F. A natural way to investigate functions is to study their graphs. Some results in this direction are presented in section 2. The evaluation function is the function of four independent variables; thus graphs are not suitable to study association measures. This problem can be partly solved by graphs of tables of critical frequencies that describe behavior of important 4ft-quantifiers in a comprehensive way; see section 4. Graphs of tables of critical frequencies are used in section 5 to describe behavior of several important 4ft-quantifiers. Section 6 compares our approach to related work. Conclusions and further research are presented in section 7. 2 Evaluation Functions of 4ft-quantifiers The association rule is the expression ϕ ψ where ϕ and ψ are Boolean attributes and is the 4ft-quantifier. The rule ϕ ψ is true in the analyzed data matrix M if the condition related to the 4ft-quantifier is satisfied in the 4ft table 4ft(ϕ, ψ, M) of ϕ and ψ in M; see Tab. 1 and Section 1. Some important 4ft-quantifiers are presented below. We use a, b, c, d see Tab. 1. In addition we use n = a + b + c + d. We also define the evaluation function F introduced in Section 1 for each presented 4ft-quantifier. The 4ft-quantifier p of founded implication is for 0 < p 1 defined in [3] by the condition a a+b p. The rule ϕ p ψ says that at least 100p per cent of objects of M satisfying ϕ satisfy also ψ. The evaluation function F p of p is defined such that F p (a, b, c, d) = a a+b, thus we write only F p (a, b) instead of F p (a, b, c, d) Remark: The 4ft-quantifier of founded implication is actually defined by the condition a a+b p a B where 0 < p 1, and B > 0. We omit the parameter B because of we are interested in the graph of the function F p (a, b). The same is true for the additional 4ft-quantifiers in this paper. The 4ft-quantifier! of lower critical implication is for 0 < p 1 and 0 < α < 0.5 defined in [3] by the condition a+b ( a+b ) i=a i p i (1 p) a+b i α. The rule ϕ! ψ can be derived from the statistical binomial test (on the significance level of α) of the null hypotheses H 0 : P (ψ ϕ) p against the alternative one H 1 : P (ψ ϕ) > p. The rule ϕ! ψ is true in the data matrix M exactly in those cases when H 0 is rejected by the test in favour of H 1. Here P (ψ ϕ) is the

3 Investigating Measures of Association by Graphs and Tables conditional probability of the validity of ψ under the condition ϕ. The evaluation function F! is defined such that F! (a, b, c, d) = a+b ( a+b ) i=a i p i (1 p) a+b i, thus we write only F! (a, b) instead of F! (a, b, c, d). The 4ft-quantifier? of upper critical implication is for 0 < p 1 and 0 < α < 0.5 defined in [3] by the condition a ( a+b ) i=0 i p i (1 p) a+b i > α. The rule ϕ! ψ can be derived from the statistical binomial test (on the significance level of α) of the null hypotheses H 0 : P (ψ ϕ) p against the alternative one H 1 : P (ψ ϕ) < p. The evaluation function F? is defined such that F? (a, b, c, d) = a ( a+b ) i=0 i p i (1 p) a+b i thus we write only F? (a, b) instead of F? (a, b, c, d). The 4ft-quantifier p of founded equivalence is for 0 < p 1 defined in [2] by the condition a+d n p. The rule ϕ p ψ means that ϕ and ψ have the same value (either true or false) for at least 100p per cent of all objects of M. The evaluation function F p of p is defined such that F p (a, b, c, d) = a+d a+b+c+d. The 4ft-quantifier δ of simple deviation is for 0 < δ defined in [3] by the condition ad > e δ bc. The rule ϕ δ ψ can be interpreted as the logarithmic interaction of ϕ and ψ is estimated to be greater than δ. The evaluation function F δ is defined such that F δ (a, b, c, d) = ln( ad bc ), the verification condition is F δ (a, b, c, d) > δ. The Fisher s quantifier α is for 0 < α < 0.5 defined in [3] by the condition min(a+b,a+c) i=a ( a+c i )( a+b+c+d i a+b i ) ( a+b+c+d a+b ) α ad > bc The rule ϕ α ψ can be derived from the statistical one-sided Fisher s test (on the level of α ) of the null hypothesis H 0 : ϕ and ψ are independent against the alternative one H 1 : the logarithmic interaction of ϕ and ψ is positive. The evaluation function F α of α is here defined such that F α (a, b, c, d) = min(a+b,a+c) i=a ( a+c i )( a+b+c+d i a+b i ) ( a+b+c+d a+b ) if ad > bc and F α (a, b, c, d) = 0.5 if ad bc. The verification condition is F α (a, b, c, d) α (for 0 < α < 0.5). The 4ft-quantifier + p of above average dependence is for 0 < p defined in [12] by the condition a a+c a+b (1 + p) n. The rule ϕ + p ψ means that among the objects satisfying ϕ is at least 100p per cent more objects satisfying ψ than among all objects. The evaluation function F + p of + p is defined such that an F + p (a, b, c, d) = (a+b)(a+c) 1, the verification condition is F + (a, b, c, d) = p. p The last presented quantifier is the pairing quantifier. The quantifier was introduced in [4] by condition 2 a2 d 2 a 4 +d p and should measure the level of 4 pairing of tuple of examined items. The evaluation function for the quantifier is F (a, b, c, d) = 2 a2 d 2 a 4 +d. The function is independent on b and c and can be 4 written as F (a, d). 3 Graphs of Evaluation Functions The method described in this article tries to learn evaluation functions of association measures by graphical means. The first attempt to explore the quantifiers

4 174 Martin Ralbovský, Jan Rauch was to plot them with suitable graphical tools. One can only draw graphs of functions that contain two or three independent variables. In case of three independent variables, we chose one of the variables (the least significant) as parameter and draw graphs of two remaining variables while changing the parameter. Although work described in this section was done mainly to get familiarized with functions and did not contain any special theory, we obtained one interesting result. It is the comparison of the founded equivalence and pairing quantifiers. The pairing quantifier is defined only by a and d, founded equivalence uses additionally n, size of the contingency table. We used n as parameter for the graph. The two graphs can be seen in figure 1. Fig. 1. Founded equivalence and Pairing quantifiers graphs Semantics of the quantifier is stated by its evaluation function. However, the formula for pairing quantifier is too complex to be comprehended. Therefore it is suitable to examine graph of this quantifier and compare it to the graph of the founded equivalence, because these two quantifiers use same variables (a and d). The founded equivalence graph is a plane that increases with a and d and its slope is determined by n. Contrary, the pairing quantifier s graph is a ridge above the ad diagonal. Then, the characterizing property of the founded equivalence is the bigger a+d, the better 1 and for pairing quantifier the closer a is to d, the better. Both quantifiers have disadvantages: founded equivalence is unable to distinguish between a and d. This fact reveals common misunderstanding of equivalence quantifiers: although it may seem that equivalence is a stronger implication, for implicational and equivalence classes of quantifiers, it is not the case. The pairing quantifier on the other hand is unable to consider b and c, thus resulting rule may be weakly supported. 1 This was apparent also from the evaluation function.

5 Investigating Measures of Association by Graphs and Tables The analysis shows us how to use both quantifiers in a more profound way. When using founded equivalence, we should also look at the ratio of a/d to see how good the rule is in terms of positive and negative examples. We should use pairing quantifier to find balanced all-positive, all-negative examples ratio; it is preferable to aid with the founded equivalence evaluation function. This new perception of the two quantifiers was made possible mainly by examining their graphs. One of the initial motivations was to somehow express the founded implication, lower critical implication and upper critical implication from the same point of view. Graph of functions do not help, because the only way to graph critical implications is to set p as parameter, which makes them incomparable to the founded implication, where the p is value of two-dimensional function. This problem is solved in section 5 by displaying graphs of critical frequencies of quantifiers. 4 Tables of Critical Frequencies Tables of critical frequencies are closely related to classes of 4ft-quantifiers. Examples of classes of 4ft-quantifiers are: implicational quantifiers [3], double implicational quantifiers [11] or Σ- equivalency quantifiers [11]. There are both theoretically interesting and practically important results that are related to classes of 4ft-quantifiers. These results concern namely deduction rules of the where both ϕ ψ and ϕ ψ are association rules; see [11], dealing with missing information; see [3, 9] and definability of association rules in classical predicate calculi with equality [10]. There are also results concerning tables of critical frequencies that can be used to optimize verification of particular association rules. We use tables of critical frequencies to simplify graphical description of behavior of some of quantifiers introduced in section 2. We deal with the class of implicational quantifiers and with the class of quantifiers with F-property. The class of implicational quantifiers is defined in [3] such that the 4ft quantifier is implicational if it satisfies the condition form ϕ ψ ϕ ψ (a, b, c, d) = 1 a a b b implies (a, b, c, d) = 1 for all the 4ft tables a, b, c, d and a, b, c, d. It is proved in [3] that the quantifiers p of founded implication,! of lower critical implication and? of upper critical implication (see section 2) are implicational. It is easy to prove that for each implicational quantifier there is a non-negative and nondecreasing function T b with value T b (a) {0, 1, 2,...} { } such that it is (a, b) = 1 if and only if b < T b (a) for all integers a 0 and b 0. We call the function T b a table of maximal b for implicational quantifier [3, 9]. It is important that precomputed

6 176 Martin Ralbovský, Jan Rauch function T b makes it possible to use a simple test of inequality instead of a rather complex computation. E.g., we can use inequality b < T b! (a) instead of condition a+b i=a (a+b)! i!(a+b i)! pi (1 p) a+b i α for quantifier! of lower critical implication. The class of 4ft-quantifiers with F-property is defined in [8] (see also [13]) such that the 4ft quantifier has the F-property if it satisfies: 1. If (a, b, c, d) = 1 and b c 1 0 then (a, b + 1, c 1, d) = If (a, b, c, d) = 1 and c b 1 0 then (a, b 1, c + 1, d) = 1. We say that the quantifier is symmetrical [3] if it satisfies (a, b, c, d) = (a, c, b, d). It is proved in [8] that for the symmetrical 4ft-quantifier with the F-property there is a function T that assigns to each triple a, d, n of natural numbers satisfying a + d n the number T (a, d, n) such that for each b 0 and c 0 where a + b + c + d = n it is (a, b, c, d) = 1 iff b c T (a, d, n). The function T (a, d, n) can be used in the same way as the function T b (a) for the implicational quantifier, see above. The function T (a, d, n) is called table of minimal b c. The functions T b and T (a, d, n) are called tables of critical frequencies. Note that there are also tables of critical frequencies for additional classes of 4ft-quantifiers; see e.g. [13]. The above stated theory allows us to compare quantifiers with reduced dimensionality. For given implicational quantifiers 1 and 2 and for given a, we say that 1 is I-stronger than 2, if T b 1 (a) > T b 2 (a). Similarly, for given quantifiers with the F-property 1, 2 and for given a, d and n, we say that 1 is F-stronger than 2, if T 1 (a, d, n) < T 2 (a, d, n). 5 Graphs of Tables of Critical Frequencies 5.1 Implicational quantifiers By the means stated in section 3 we examined the three most used implicational quatifiers: founded implication, lower and upper critical implication. Figure 2 displays graphs of maximal b s for p = 0.8, α = 0.05 and for a = The graph shows, that we cannot use (in the examined range of a) computationally simple founded implication instead of statistically sound but computationally demanding lower and upper critical implications. This is an important result that could not be obtained without construction of tables of maximal b s. We can think of tables of maximal b as another definition of the quantifier. It is function from a to b. For founded implication we know exact definition of the function. It is T b p = a(1 p) p + 1 and can be obtained by basic arithmetic operations, x means upper integer part of x. To our best knowledge, arithmetic extraction of the function for critical implications is impossible. For construction

7 Investigating Measures of Association by Graphs and Tables Fig. 2. Tables of maximal b s for implicational quantifiers of the table, we programmed iterations over a and b and checked, when the evaluation function stops being valid. This is computationally demanding because of the factorials in binomial coefficient and cannot be done effectively for very high numbers. Thus the method cannot be used to calculate values of functions close to infinite values. To get a better idea about the functions, we examined their slopes. It is constant for founded implication and equals the 1 p p. Slopes of the critical implication in chosen points (a values) are shown in table 2. Table 2. Slopes of critical frequencies p = 0.8, α = Lower Critical Impl Upper Critical Impl The table reveals interesting facts. Note, that the difference between slopes of critical implications and slope of founded implication remains the same. This means that the critical implications maximal b s tables are symmetric with respect to the founded implication maximal b table. Our working hypothesis is, that T b! lim (a) T b? = lim (a) T b p (a) = lim = 1 p a a a a a a p.

8 178 Martin Ralbovský, Jan Rauch However we are currently unable to prove it. If we combine the hypothesis with results from figure 2 (for fixed p, α the lower critical implication is I-stronger than founded implication, which is I-stronger than upper critical implication, than for all natural a, T b! (a) < T b p (a) < T b? (a). 5.2 Quantifiers with F-property For quantifiers with the F property, we constructed tables of minimal b c s. The construction algorithm worked in two steps: the first step was to find a, b, c, d quadruples that satisfied the quantifier. The second step was to find for given a and d the minimal b c for the quadruples. This way a matrix indexed with a and d containing minimal valid b c was obtained. The matrix subsequently transformed to a graph. We compared the simple deviation and Fisher s quantifiers. The results are displayed in figure 3, where graphs of tables of critical frequencies for n = 10 and n = 1000 are shown, α = 0.05 and δ = 0. Fig. 3. Tables of minimal b c for Fisher and Simple Deviation quantifiers The graphs show, that Fisher s quantifier behaves differently for n = 10 and for n = In the latter case, graphs of two quantifiers resemble each other,

9 Investigating Measures of Association by Graphs and Tables which was expcected. We did not compute values of the graph in all the possible points, we chose 100 representative points instead. Therefore the graphs only estimate real tables of minimal b c. For larger sizes of contingency tables, it is preferable to use the simple deviation 2. We also examined the above average dependence graph as shown in figure 4, with n = 1000 and p = 0 (this corresponds to δ = 0 for simple deviation). Note, that all the graphs displayed have a similar feature: the quantifiers are F-strongest along the inverse ad diagonal. This is the most interesting result of experiments with tables of minimal b c. It is a promising important characteristics of quantifiers with F-property, and should receive further attention. Fig. 4. Tables of minimal b c for Above average dependence quantifier The points along the inverse ad diagonal have a common property, that is their sum is equal or close to n. This means that there is not much left for b and c (from n, the size of the contingency table). This explains, why values of minimal b c are so low along the inverse ad diagonal, but it does not explain the fact, that the all three examined quantifiers are valid along this diagonal 3. The validity of quantifiers with F-property along the inverse ad diagonal remains an open question. 6 Related Work One of the most known methods for graphical comparison of classification functions are ROC curves [1]. The theory dealing with ROC curves originates from 2 Or χ 2 quantifier, which was not introduced in this paper. 3 This is rather obvious for simple deviation quantifier, but not obvious for quantifiers with the F-property at all

10 180 Martin Ralbovský, Jan Rauch construction of confusion matrices, which are similar to 4ft-tables presented in this paper. The theory gives meaning to points in the ROC space, to ROC curves and the area under ROC curves. However, the curves are used mainly for measuring quality of classification functions. In our approach, we are not interested in the fact, how good the evaluation functions were if used as classifiers. Therefore, the ROC curves are not object of our interest. 7 Conclusions Understanding of association measures is one of the key factors in association mining[5 7]. The subject has been gaining lasting scientific attention. In the paper, we studied graphs of evaluation functions of association measures (quantifiers). This task was difficult mainly because the evaluation functions are in general functions of four independent variables. However, for some quantifiers this was possible. We constructed graphs of founded equivalence and pairing quantifiers, the graphs enabled comparison of the two quantifiers and showed some properties, which were not apparent without the graphical representation. For other quantifiers, we used existing theory concerning classes of quantifiers and tables of critical frequencies. Tables of critical frequencies help to reduce the dimensionality of the quantifier evaluation function while preserving properties of the quantifier. We compared founded implication with lower and upper critical implication from the implicational class by constructing tables of maximal b s. For symmetrical quantifiers with F-property one can construct tables of minimal b c. We constructed the tables for Fisher s quantifier, above average dependence and simple deviation and observed interesting properties, the most significant being the F-strength of all observed quantifiers along the inverse ad diagonal. To summarize, graphing functions of quantifiers combined with theoretical result is a strong and promising tool that broadens our knowledge about quantifiers. The paper is an initiatory work in the field, majority of quantifiers and possibilities to graph them were unemployed. The work also showed further direction of research in the area. Issues such as construction of graphs of critical frequencies for other classes of quantifiers, effects of changes of the parameters on the graphs or various combinations of several graphs will be subjected to further research. Acknowledgements This work was supported by the project MSM of the Ministry of Education of the Czech Republic and by the project 201/05/0325 of the Czech Science Foundation.

11 Investigating Measures of Association by Graphs and Tables References 1. Fawcett T.: ROC Graphs: Notes and Practical Considerations for Data Mining Researchers. Technical report HPL HP Labs, Hájek P, Havránek T, Chytil M (1983) GUHA Method. Academia, Prague (in Czech) 3. Hájek P, Havránek T (1978) Mechanising Hypothesis Formation - Mathematical Foundations for a General Theory. Springer, Berlin Heidelberg New York 4. Kupka D.: User support 4ft-miner procedure for data mining. Master Thesis, Faculty of Mathematics and Physics, Charles University, Prague 2007 (in Czech) 5. Wu T., Chen Y., Han J.: Association Mining in Large Databases: A Reexamination of Its Measures. In: Kok J. (Edt.): Knowledge Discovery in Databases: PKDD 2007, conference proceedings. Springer Verlag, 2007, ISBN: Céline H. Crémilleux B.: A Unified View of Objective Interestingness Measures. In.: Perner P.(Edt.): Machine Learning and Data Mining in Pattern Recognition. MLDM 2007, conference proceedings, Springer, Tan P., Kumar V. Srivastava J.: Selecting the right interestingness measure for association patterns. In Proceedings of the Eight A CM SIGKDD International Conference on Knowledge Discovery and Data Mining, July Rauch J (1986) Logical Foundations of Hypothesis Formation from Databases. Mathematical Institute of the Czechoslovak Academy of Sciences, Prague, Dissertation (in Czech) 9. Rauch J (1998) Classes of Four-Fold Table Quantifiers. In: Zytkow J, Quafafou M (Eds.): Principles of Data Mining and Knowledge Discovery. Springer, Berlin Heidelberg New York 10. Rauch J (2004) Definability of Association Rules and Tables of Critical Frequencies. In: Lin T Y et al. (Eds.): Foundations of Data Mining. Brighton, IEEE Computer Society 11. Rauch J (2005) Logic of Association Rules. Applied Intelligence, 22, pp Rauch J., Šimůnek M.: (2005) An Alternative Approach to Mining Association Rules. In: Lin T Y et al. (Eds.) Data Mining: Foundations, Methods, and Applications. Springer, Berlin Heidelberg New York 13. Rauch, J.: Observational Calculi, Classes of Association Rules and F-property. San Francisco In: Granular Computing Los Alamitos: IEEE Computer Society Press, 2007, s ISBN X 14. Ralbovský M, Kuchař T (2007) Using Disjunctions in Association Mining. In: Perner P (Ed.): Advances in Data Mining - Theoretical Aspects and Applications. Springer, Berlin Heidelberg New York

Alternative Approach to Mining Association Rules

Alternative Approach to Mining Association Rules Alternative Approach to Mining Association Rules Jan Rauch 1, Milan Šimůnek 1 2 1 Faculty of Informatics and Statistics, University of Economics Prague, Czech Republic 2 Institute of Computer Sciences,

More information

Applying Domain Knowledge in Association Rules Mining Process First Experience

Applying Domain Knowledge in Association Rules Mining Process First Experience Applying Domain Knowledge in Association Rules Mining Process First Experience Jan Rauch, Milan Šimůnek Faculty of Informatics and Statistics, University of Economics, Prague nám W. Churchilla 4, 130 67

More information

Mining in Hepatitis Data by LISp-Miner and SumatraTT

Mining in Hepatitis Data by LISp-Miner and SumatraTT Mining in Hepatitis Data by LISp-Miner and SumatraTT Petr Aubrecht 1, Martin Kejkula 2, Petr Křemen 1, Lenka Nováková 1, Jan Rauch 2, Milan Šimůnek2, Olga Štěpánková1, and Monika Žáková1 1 Czech Technical

More information

The GUHA method and its meaning for data mining. Petr Hájek, Martin Holeňa, Jan Rauch

The GUHA method and its meaning for data mining. Petr Hájek, Martin Holeňa, Jan Rauch The GUHA method and its meaning for data mining Petr Hájek, Martin Holeňa, Jan Rauch 1 Introduction. GUHA: a method of exploratory data analysis developed in Prague since mid-sixties of the past century.

More information

USING THE AC4FT-MINER PROCEDURE IN THE MEDICAL DOMAIN. Viktor Nekvapil

USING THE AC4FT-MINER PROCEDURE IN THE MEDICAL DOMAIN. Viktor Nekvapil USING THE AC4FT-MINER PROCEDURE IN THE MEDICAL DOMAIN Viktor Nekvapil About the author 2 VŠE: IT 4IQ, 2. semestr Bachelor thesis: Using the Ac4ft-Miner procedure in the medical domain Supervisor: doc.

More information

Feature Selection by Reordering *

Feature Selection by Reordering * Feature Selection by Reordering * Marcel Jirina and Marcel Jirina jr. 2 Institute of Computer Science, Pod vodarenskou vezi 2, 82 07 Prague 8 Liben, Czech Republic marcel@cs.cas.cz 2 Center of Applied

More information

Regrese a predikce pomocí fuzzy asociačních pravidel

Regrese a predikce pomocí fuzzy asociačních pravidel Regrese a predikce pomocí fuzzy asociačních pravidel Pavel Rusnok Institute for Research and Applications of Fuzzy Modeling University of Ostrava Ostrava, Czech Republic pavel.rusnok@osu.cz March 1, 2018,

More information

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT 1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations

More information

Performance Evaluation and Comparison

Performance Evaluation and Comparison Outline Hong Chang Institute of Computing Technology, Chinese Academy of Sciences Machine Learning Methods (Fall 2012) Outline Outline I 1 Introduction 2 Cross Validation and Resampling 3 Interval Estimation

More information

HANDOUT AND SET THEORY. Ariyadi Wijaya

HANDOUT AND SET THEORY. Ariyadi Wijaya HANDOUT LOGIC AND SET THEORY Ariyadi Wijaya Mathematics Education Department Faculty of Mathematics and Natural Science Yogyakarta State University 2009 1 Mathematics Education Department Faculty of Mathematics

More information

Well-behaved Principles Alternative to Bounded Induction

Well-behaved Principles Alternative to Bounded Induction Well-behaved Principles Alternative to Bounded Induction Zofia Adamowicz 1 Institute of Mathematics, Polish Academy of Sciences Śniadeckich 8, 00-956 Warszawa Leszek Aleksander Ko lodziejczyk Institute

More information

Machine Learning and Association rules. Petr Berka, Jan Rauch University of Economics, Prague {berka

Machine Learning and Association rules. Petr Berka, Jan Rauch University of Economics, Prague {berka Machine Learning and Association rules Petr Berka, Jan Rauch University of Economics, Prague {berka rauch}@vse.cz Tutorial Outline Statistics, machine learning and data mining basic concepts, similarities

More information

Introduction to Metalogic

Introduction to Metalogic Philosophy 135 Spring 2008 Tony Martin Introduction to Metalogic 1 The semantics of sentential logic. The language L of sentential logic. Symbols of L: Remarks: (i) sentence letters p 0, p 1, p 2,... (ii)

More information

Optimizing Abstaining Classifiers using ROC Analysis. Tadek Pietraszek / 'tʌ dek pɪe 'trʌ ʃek / ICML 2005 August 9, 2005

Optimizing Abstaining Classifiers using ROC Analysis. Tadek Pietraszek / 'tʌ dek pɪe 'trʌ ʃek / ICML 2005 August 9, 2005 IBM Zurich Research Laboratory, GSAL Optimizing Abstaining Classifiers using ROC Analysis Tadek Pietraszek / 'tʌ dek pɪe 'trʌ ʃek / pie@zurich.ibm.com ICML 2005 August 9, 2005 To classify, or not to classify:

More information

NOMINAL VARIABLE CLUSTERING AND ITS EVALUATION

NOMINAL VARIABLE CLUSTERING AND ITS EVALUATION NOMINAL VARIABLE CLUSTERING AND ITS EVALUATION Hana Řezanková Abstract The paper evaluates clustering of nominal variables using different similarity measures. The created clusters can serve for dimensionality

More information

Iterative Laplacian Score for Feature Selection

Iterative Laplacian Score for Feature Selection Iterative Laplacian Score for Feature Selection Linling Zhu, Linsong Miao, and Daoqiang Zhang College of Computer Science and echnology, Nanjing University of Aeronautics and Astronautics, Nanjing 2006,

More information

Multivalued functions in digital topology

Multivalued functions in digital topology Note di Matematica ISSN 1123-2536, e-issn 1590-0932 Note Mat. 37 (2017) no. 2, 61 76. doi:10.1285/i15900932v37n2p61 Multivalued functions in digital topology Laurence Boxer Department of Computer and Information

More information

Inequalities Between Hypergeometric Tails

Inequalities Between Hypergeometric Tails JOURNAL OF APPLIED MATHEMATICS AND DECISION SCIENCES, 7(3), 165 174 Copyright c 2003, Lawrence Erlbaum Associates, Inc. Inequalities Between Hypergeometric Tails MARY C. PHIPPS maryp@maths.usyd.edu.au

More information

if t 1,...,t k Terms and P k is a k-ary predicate, then P k (t 1,...,t k ) Formulas (atomic formulas)

if t 1,...,t k Terms and P k is a k-ary predicate, then P k (t 1,...,t k ) Formulas (atomic formulas) FOL Query Evaluation Giuseppe De Giacomo Università di Roma La Sapienza Corso di Seminari di Ingegneria del Software: Data and Service Integration Laurea Specialistica in Ingegneria Informatica Università

More information

COMP219: Artificial Intelligence. Lecture 19: Logic for KR

COMP219: Artificial Intelligence. Lecture 19: Logic for KR COMP219: Artificial Intelligence Lecture 19: Logic for KR 1 Overview Last time Expert Systems and Ontologies Today Logic as a knowledge representation scheme Propositional Logic Syntax Semantics Proof

More information

On Sequent Calculi for Intuitionistic Propositional Logic

On Sequent Calculi for Intuitionistic Propositional Logic On Sequent Calculi for Intuitionistic Propositional Logic Vítězslav Švejdar Jan 29, 2005 The original publication is available at CMUC. Abstract The well-known Dyckoff s 1992 calculus/procedure for intuitionistic

More information

1 First-order logic. 1 Syntax of first-order logic. 2 Semantics of first-order logic. 3 First-order logic queries. 2 First-order query evaluation

1 First-order logic. 1 Syntax of first-order logic. 2 Semantics of first-order logic. 3 First-order logic queries. 2 First-order query evaluation Knowledge Bases and Databases Part 1: First-Order Queries Diego Calvanese Faculty of Computer Science Master of Science in Computer Science A.Y. 2007/2008 Overview of Part 1: First-order queries 1 First-order

More information

Overview of Topics. Finite Model Theory. Finite Model Theory. Connections to Database Theory. Qing Wang

Overview of Topics. Finite Model Theory. Finite Model Theory. Connections to Database Theory. Qing Wang Overview of Topics Finite Model Theory Part 1: Introduction 1 What is finite model theory? 2 Connections to some areas in CS Qing Wang qing.wang@anu.edu.au Database theory Complexity theory 3 Basic definitions

More information

Using Matrix Decompositions in Formal Concept Analysis

Using Matrix Decompositions in Formal Concept Analysis Using Matrix Decompositions in Formal Concept Analysis Vaclav Snasel 1, Petr Gajdos 1, Hussam M. Dahwa Abdulla 1, Martin Polovincak 1 1 Dept. of Computer Science, Faculty of Electrical Engineering and

More information

Guaranteeing the Accuracy of Association Rules by Statistical Significance

Guaranteeing the Accuracy of Association Rules by Statistical Significance Guaranteeing the Accuracy of Association Rules by Statistical Significance W. Hämäläinen Department of Computer Science, University of Helsinki, Finland Abstract. Association rules are a popular knowledge

More information

Natural Deduction. Formal Methods in Verification of Computer Systems Jeremy Johnson

Natural Deduction. Formal Methods in Verification of Computer Systems Jeremy Johnson Natural Deduction Formal Methods in Verification of Computer Systems Jeremy Johnson Outline 1. An example 1. Validity by truth table 2. Validity by proof 2. What s a proof 1. Proof checker 3. Rules of

More information

Unifying Version Space Representations: Part II

Unifying Version Space Representations: Part II Unifying Version Space Representations: Part II E.N. Smirnov, I.G. Sprinkhuizen-Kuyper, and H.J. van den Herik IKAT, Department of Computer Science, Maastricht University, P.O.Box 616, 6200 MD Maastricht,

More information

Logic: Propositional Logic (Part I)

Logic: Propositional Logic (Part I) Logic: Propositional Logic (Part I) Alessandro Artale Free University of Bozen-Bolzano Faculty of Computer Science http://www.inf.unibz.it/ artale Descrete Mathematics and Logic BSc course Thanks to Prof.

More information

03 Propositional Logic II

03 Propositional Logic II Martin Henz February 12, 2014 Generated on Wednesday 12 th February, 2014, 09:49 1 Review: Syntax and Semantics of Propositional Logic 2 3 Propositional Atoms and Propositions Semantics of Formulas Validity,

More information

Easy Categorization of Attributes in Decision Tables Based on Basic Binary Discernibility Matrix

Easy Categorization of Attributes in Decision Tables Based on Basic Binary Discernibility Matrix Easy Categorization of Attributes in Decision Tables Based on Basic Binary Discernibility Matrix Manuel S. Lazo-Cortés 1, José Francisco Martínez-Trinidad 1, Jesús Ariel Carrasco-Ochoa 1, and Guillermo

More information

INDUCTION AND RECURSION

INDUCTION AND RECURSION INDUCTION AND RECURSION Jorma K. Mattila LUT, Department of Mathematics and Physics 1 Induction on Basic and Natural Numbers 1.1 Introduction In its most common form, mathematical induction or, as it is

More information

COMP219: Artificial Intelligence. Lecture 19: Logic for KR

COMP219: Artificial Intelligence. Lecture 19: Logic for KR COMP219: Artificial Intelligence Lecture 19: Logic for KR 1 Overview Last time Expert Systems and Ontologies Today Logic as a knowledge representation scheme Propositional Logic Syntax Semantics Proof

More information

Learning Goals of CS245 Logic and Computation

Learning Goals of CS245 Logic and Computation Learning Goals of CS245 Logic and Computation Alice Gao April 27, 2018 Contents 1 Propositional Logic 2 2 Predicate Logic 4 3 Program Verification 6 4 Undecidability 7 1 1 Propositional Logic Introduction

More information

On Proofs and Rule of Multiplication in Fuzzy Attribute Logic

On Proofs and Rule of Multiplication in Fuzzy Attribute Logic On Proofs and Rule of Multiplication in Fuzzy Attribute Logic Radim Belohlavek 1,2 and Vilem Vychodil 2 1 Dept. Systems Science and Industrial Engineering, Binghamton University SUNY Binghamton, NY 13902,

More information

Mathematics 114L Spring 2018 D.A. Martin. Mathematical Logic

Mathematics 114L Spring 2018 D.A. Martin. Mathematical Logic Mathematics 114L Spring 2018 D.A. Martin Mathematical Logic 1 First-Order Languages. Symbols. All first-order languages we consider will have the following symbols: (i) variables v 1, v 2, v 3,... ; (ii)

More information

Methods of Partial Logic for Knowledge Representation and Deductive Reasoning in Incompletely Specified Domains

Methods of Partial Logic for Knowledge Representation and Deductive Reasoning in Incompletely Specified Domains Methods of Partial Logic for Knowledge Representation and Deductive Reasoning in Incompletely Specified Domains Anatoly Prihozhy and Liudmila Prihozhaya Information Technologies and Robotics Department,

More information

Arithmetical classification of the set of all provably recursive functions

Arithmetical classification of the set of all provably recursive functions Arithmetical classification of the set of all provably recursive functions Vítězslav Švejdar April 12, 1999 The original publication is available at CMUC. Abstract The set of all indices of all functions

More information

Implementing Proof Systems for the Intuitionistic Propositional Logic

Implementing Proof Systems for the Intuitionistic Propositional Logic Implementing Proof Systems for the Intuitionistic Propositional Logic Veronica Zammit Supervisor: Dr. Adrian Francalanza Faculty of ICT University of Malta May 27, 2011 Submitted in partial fulfillment

More information

Evaluation, transformation, and parameterization of epipolar conics

Evaluation, transformation, and parameterization of epipolar conics Evaluation, transformation, and parameterization of epipolar conics Tomáš Svoboda svoboda@cmp.felk.cvut.cz N - CTU CMP 2000 11 July 31, 2000 Available at ftp://cmp.felk.cvut.cz/pub/cmp/articles/svoboda/svoboda-tr-2000-11.pdf

More information

Topics in Logic and Proofs

Topics in Logic and Proofs Chapter 2 Topics in Logic and Proofs Some mathematical statements carry a logical value of being true or false, while some do not. For example, the statement 4 + 5 = 9 is true, whereas the statement 2

More information

Hypersequent Calculi for some Intermediate Logics with Bounded Kripke Models

Hypersequent Calculi for some Intermediate Logics with Bounded Kripke Models Hypersequent Calculi for some Intermediate Logics with Bounded Kripke Models Agata Ciabattoni Mauro Ferrari Abstract In this paper we define cut-free hypersequent calculi for some intermediate logics semantically

More information

Discrete Mathematics and Probability Theory Fall 2012 Vazirani Note 1

Discrete Mathematics and Probability Theory Fall 2012 Vazirani Note 1 CS 70 Discrete Mathematics and Probability Theory Fall 2012 Vazirani Note 1 Course Outline CS70 is a course on "Discrete Mathematics and Probability for Computer Scientists." The purpose of the course

More information

Logic & Logic Agents Chapter 7 (& background)

Logic & Logic Agents Chapter 7 (& background) Lecture Notes, Advanced Artificial Intelligence (SCOM7341) Sina Institute, University of Birzeit 2 nd Semester, 2012 Advanced Artificial Intelligence (SCOM7341) Logic & Logic Agents Chapter 7 (& background)

More information

Chapter 4: Classical Propositional Semantics

Chapter 4: Classical Propositional Semantics Chapter 4: Classical Propositional Semantics Language : L {,,, }. Classical Semantics assumptions: TWO VALUES: there are only two logical values: truth (T) and false (F), and EXTENSIONALITY: the logical

More information

The State Explosion Problem

The State Explosion Problem The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis

More information

ICS141: Discrete Mathematics for Computer Science I

ICS141: Discrete Mathematics for Computer Science I ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Originals slides by Dr. Baek and Dr. Still, adapted by J. Stelovsky Based on slides Dr. M. P. Frank and Dr. J.L. Gross

More information

2. Associative Law: A binary operator * on a set S is said to be associated whenever (A*B)*C = A*(B*C) for all A,B,C S.

2. Associative Law: A binary operator * on a set S is said to be associated whenever (A*B)*C = A*(B*C) for all A,B,C S. BOOLEAN ALGEBRA 2.1 Introduction Binary logic deals with variables that have two discrete values: 1 for TRUE and 0 for FALSE. A simple switching circuit containing active elements such as a diode and transistor

More information

Comp487/587 - Boolean Formulas

Comp487/587 - Boolean Formulas Comp487/587 - Boolean Formulas 1 Logic and SAT 1.1 What is a Boolean Formula Logic is a way through which we can analyze and reason about simple or complicated events. In particular, we are interested

More information

Logic, Sets, and Proofs

Logic, Sets, and Proofs Logic, Sets, and Proofs David A. Cox and Catherine C. McGeoch Amherst College 1 Logic Logical Operators. A logical statement is a mathematical statement that can be assigned a value either true or false.

More information

EVALUATING MISCLASSIFICATION PROBABILITY USING EMPIRICAL RISK 1. Victor Nedel ko

EVALUATING MISCLASSIFICATION PROBABILITY USING EMPIRICAL RISK 1. Victor Nedel ko 94 International Journal "Information Theories & Applications" Vol13 [Raudys, 001] Raudys S, Statistical and neural classifiers, Springer, 001 [Mirenkova, 00] S V Mirenkova (edel ko) A method for prediction

More information

Classification Based on Logical Concept Analysis

Classification Based on Logical Concept Analysis Classification Based on Logical Concept Analysis Yan Zhao and Yiyu Yao Department of Computer Science, University of Regina, Regina, Saskatchewan, Canada S4S 0A2 E-mail: {yanzhao, yyao}@cs.uregina.ca Abstract.

More information

Unprovability of circuit upper bounds in Cook s theory PV

Unprovability of circuit upper bounds in Cook s theory PV Unprovability of circuit upper bounds in Cook s theory PV Igor Carboni Oliveira Faculty of Mathematics and Physics, Charles University in Prague. Based on joint work with Jan Krajíček (Prague). [Dagstuhl

More information

Propositions and Proofs

Propositions and Proofs Chapter 2 Propositions and Proofs The goal of this chapter is to develop the two principal notions of logic, namely propositions and proofs There is no universal agreement about the proper foundations

More information

Writing Mathematical Proofs

Writing Mathematical Proofs Writing Mathematical Proofs Dr. Steffi Zegowitz The main resources for this course are the two following books: Mathematical Proofs by Chartrand, Polimeni, and Zhang How to Think Like a Mathematician by

More information

USING SINGULAR VALUE DECOMPOSITION (SVD) AS A SOLUTION FOR SEARCH RESULT CLUSTERING

USING SINGULAR VALUE DECOMPOSITION (SVD) AS A SOLUTION FOR SEARCH RESULT CLUSTERING POZNAN UNIVE RSIY OF E CHNOLOGY ACADE MIC JOURNALS No. 80 Electrical Engineering 2014 Hussam D. ABDULLA* Abdella S. ABDELRAHMAN* Vaclav SNASEL* USING SINGULAR VALUE DECOMPOSIION (SVD) AS A SOLUION FOR

More information

Contents Propositional Logic: Proofs from Axioms and Inference Rules

Contents Propositional Logic: Proofs from Axioms and Inference Rules Contents 1 Propositional Logic: Proofs from Axioms and Inference Rules... 1 1.1 Introduction... 1 1.1.1 An Example Demonstrating the Use of Logic in Real Life... 2 1.2 The Pure Propositional Calculus...

More information

New York State Testing Program Grade 8 Common Core Mathematics Test. Released Questions with Annotations

New York State Testing Program Grade 8 Common Core Mathematics Test. Released Questions with Annotations New York State Testing Program Grade 8 Common Core Mathematics Test Released Questions with Annotations August 2013 THE STATE EDUCATION DEPARTMENT / THE UNIVERSITY OF THE STATE OF NEW YORK / ALBANY, NY

More information

Fuzzy Systems. Introduction

Fuzzy Systems. Introduction Fuzzy Systems Introduction Prof. Dr. Rudolf Kruse Christian Moewes {kruse,cmoewes}@iws.cs.uni-magdeburg.de Otto-von-Guericke University of Magdeburg Faculty of Computer Science Department of Knowledge

More information

Towards Formal Theory of Measure on Clans of Fuzzy Sets

Towards Formal Theory of Measure on Clans of Fuzzy Sets Towards Formal Theory of Measure on Clans of Fuzzy Sets Tomáš Kroupa Institute of Information Theory and Automation Academy of Sciences of the Czech Republic Pod vodárenskou věží 4 182 08 Prague 8 Czech

More information

Improved Holt Method for Irregular Time Series

Improved Holt Method for Irregular Time Series WDS'08 Proceedings of Contributed Papers, Part I, 62 67, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Improved Holt Method for Irregular Time Series T. Hanzák Charles University, Faculty of Mathematics and

More information

Propositional Logic, Predicates, and Equivalence

Propositional Logic, Predicates, and Equivalence Chapter 1 Propositional Logic, Predicates, and Equivalence A statement or a proposition is a sentence that is true (T) or false (F) but not both. The symbol denotes not, denotes and, and denotes or. If

More information

Chapter ML:IV. IV. Statistical Learning. Probability Basics Bayes Classification Maximum a-posteriori Hypotheses

Chapter ML:IV. IV. Statistical Learning. Probability Basics Bayes Classification Maximum a-posteriori Hypotheses Chapter ML:IV IV. Statistical Learning Probability Basics Bayes Classification Maximum a-posteriori Hypotheses ML:IV-1 Statistical Learning STEIN 2005-2017 Area Overview Mathematics Statistics...... Stochastics

More information

Lecture Notes: Axiomatic Semantics and Hoare-style Verification

Lecture Notes: Axiomatic Semantics and Hoare-style Verification Lecture Notes: Axiomatic Semantics and Hoare-style Verification 17-355/17-665/17-819O: Program Analysis (Spring 2018) Claire Le Goues and Jonathan Aldrich clegoues@cs.cmu.edu, aldrich@cs.cmu.edu It has

More information

Overview. Knowledge-Based Agents. Introduction. COMP219: Artificial Intelligence. Lecture 19: Logic for KR

Overview. Knowledge-Based Agents. Introduction. COMP219: Artificial Intelligence. Lecture 19: Logic for KR COMP219: Artificial Intelligence Lecture 19: Logic for KR Last time Expert Systems and Ontologies oday Logic as a knowledge representation scheme Propositional Logic Syntax Semantics Proof theory Natural

More information

Fuzzy Propositional Logic for the Knowledge Representation

Fuzzy Propositional Logic for the Knowledge Representation Fuzzy Propositional Logic for the Knowledge Representation Alexander Savinov Institute of Mathematics Academy of Sciences Academiei 5 277028 Kishinev Moldova (CIS) Phone: (373+2) 73-81-30 EMAIL: 23LSII@MATH.MOLDOVA.SU

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Parallel Turing Machines on a Two-Dimensional Tape

Parallel Turing Machines on a Two-Dimensional Tape Czech Pattern ecognition Workshop 000, Tomáš Svoboda (Ed.) Peršlák, Czech epublic, February 4, 000 Czech Pattern ecognition Society Parallel Turing Machines on a Two-Dimensional Tape Daniel Průša František

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment Enhancing Generalization Capability of SVM Classifiers ith Feature Weight Adjustment Xizhao Wang and Qiang He College of Mathematics and Computer Science, Hebei University, Baoding 07002, Hebei, China

More information

An Application of Graph Theory in Markov Chains Reliability Analysis

An Application of Graph Theory in Markov Chains Reliability Analysis An Application of Graph Theory in Markov Chains Reliability Analysis Pavel SKALNY Department of Applied Mathematics, Faculty of Electrical Engineering and Computer Science, VSB Technical University of

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

Jane and Joe are measuring the circumference of a dime with a string. Jane' s result is: 55 mm Joe's result is: 58 mm

Jane and Joe are measuring the circumference of a dime with a string. Jane' s result is: 55 mm Joe's result is: 58 mm A LESSON ON ABSOLUTE VALUE Jane and Joe are measuring the circumference of a dime with a string. Jane' s result is: 55 mm Joe's result is: 58 mm Tom knows the true length of the circumference: 56 mm. He

More information

AI Programming CS S-09 Knowledge Representation

AI Programming CS S-09 Knowledge Representation AI Programming CS662-2013S-09 Knowledge Representation David Galles Department of Computer Science University of San Francisco 09-0: Overview So far, we ve talked about search, which is a means of considering

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica. Final exam Logic & Set Theory (2IT61) (correction model)

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica. Final exam Logic & Set Theory (2IT61) (correction model) TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Final exam Logic & Set Theory (2IT61) (correction model) Thursday November 4, 2016, 9:00 12:00 hrs. (2) 1. Determine whether the abstract

More information

A Combined Approach for Outliers Detection in Fuzzy Functional Dependency through the Typology of Fuzzy Rules

A Combined Approach for Outliers Detection in Fuzzy Functional Dependency through the Typology of Fuzzy Rules A ombined Approach for Outliers Detection in Fuzzy Functional Dependency through the Typology of Fuzzy ules Shaheera ashwan Soheir Fouad and isham Sewelam Department of omputer Science Faculty of Engineering

More information

Reference Material /Formulas for Pre-Calculus CP/ H Summer Packet

Reference Material /Formulas for Pre-Calculus CP/ H Summer Packet Reference Material /Formulas for Pre-Calculus CP/ H Summer Packet Week # 1 Order of Operations Step 1 Evaluate expressions inside grouping symbols. Order of Step 2 Evaluate all powers. Operations Step

More information

Natural Deduction for Propositional Logic

Natural Deduction for Propositional Logic Natural Deduction for Propositional Logic Bow-Yaw Wang Institute of Information Science Academia Sinica, Taiwan September 10, 2018 Bow-Yaw Wang (Academia Sinica) Natural Deduction for Propositional Logic

More information

9th and 10th Grade Math Proficiency Objectives Strand One: Number Sense and Operations

9th and 10th Grade Math Proficiency Objectives Strand One: Number Sense and Operations Strand One: Number Sense and Operations Concept 1: Number Sense Understand and apply numbers, ways of representing numbers, the relationships among numbers, and different number systems. Justify with examples

More information

6. Logical Inference

6. Logical Inference Artificial Intelligence 6. Logical Inference Prof. Bojana Dalbelo Bašić Assoc. Prof. Jan Šnajder University of Zagreb Faculty of Electrical Engineering and Computing Academic Year 2016/2017 Creative Commons

More information

MAI0203 Lecture 7: Inference and Predicate Calculus

MAI0203 Lecture 7: Inference and Predicate Calculus MAI0203 Lecture 7: Inference and Predicate Calculus Methods of Artificial Intelligence WS 2002/2003 Part II: Inference and Knowledge Representation II.7 Inference and Predicate Calculus MAI0203 Lecture

More information

Fuzzy Systems. Introduction

Fuzzy Systems. Introduction Fuzzy Systems Introduction Prof. Dr. Rudolf Kruse Christoph Doell {kruse,doell}@iws.cs.uni-magdeburg.de Otto-von-Guericke University of Magdeburg Faculty of Computer Science Department of Knowledge Processing

More information

Dynamic Semantics. Dynamic Semantics. Operational Semantics Axiomatic Semantics Denotational Semantic. Operational Semantics

Dynamic Semantics. Dynamic Semantics. Operational Semantics Axiomatic Semantics Denotational Semantic. Operational Semantics Dynamic Semantics Operational Semantics Denotational Semantic Dynamic Semantics Operational Semantics Operational Semantics Describe meaning by executing program on machine Machine can be actual or simulated

More information

Classifying classes of structures in model theory

Classifying classes of structures in model theory Classifying classes of structures in model theory Saharon Shelah The Hebrew University of Jerusalem, Israel, and Rutgers University, NJ, USA ECM 2012 Saharon Shelah (HUJI and Rutgers) Classifying classes

More information

FUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH

FUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH FUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH M. De Cock C. Cornelis E. E. Kerre Dept. of Applied Mathematics and Computer Science Ghent University, Krijgslaan 281 (S9), B-9000 Gent, Belgium phone: +32

More information

Major Matrix Mathematics Education 7-12 Licensure - NEW

Major Matrix Mathematics Education 7-12 Licensure - NEW Course Name(s) Number(s) Choose One: MATH 303Differential Equations MATH 304 Mathematical Modeling MATH 305 History and Philosophy of Mathematics MATH 405 Advanced Calculus MATH 406 Mathematical Statistics

More information

3. Only sequences that were formed by using finitely many applications of rules 1 and 2, are propositional formulas.

3. Only sequences that were formed by using finitely many applications of rules 1 and 2, are propositional formulas. 1 Chapter 1 Propositional Logic Mathematical logic studies correct thinking, correct deductions of statements from other statements. Let us make it more precise. A fundamental property of a statement is

More information

Math 10850, fall 2017, University of Notre Dame

Math 10850, fall 2017, University of Notre Dame Math 10850, fall 2017, University of Notre Dame Notes on first exam September 22, 2017 The key facts The first midterm will be on Thursday, September 28, 6.15pm-7.45pm in Hayes-Healy 127. What you need

More information

Regression Analysis. BUS 735: Business Decision Making and Research. Learn how to detect relationships between ordinal and categorical variables.

Regression Analysis. BUS 735: Business Decision Making and Research. Learn how to detect relationships between ordinal and categorical variables. Regression Analysis BUS 735: Business Decision Making and Research 1 Goals of this section Specific goals Learn how to detect relationships between ordinal and categorical variables. Learn how to estimate

More information

Level mapping characterizations for quantitative and disjunctive logic programs

Level mapping characterizations for quantitative and disjunctive logic programs Level mapping characterizations for quantitative and disjunctive logic programs Matthias Knorr Bachelor Thesis supervised by Prof. Dr. Steffen Hölldobler under guidance of Dr. Pascal Hitzler Knowledge

More information

Lecture Notes on Quantification

Lecture Notes on Quantification Lecture Notes on Quantification 15-317: Constructive Logic Frank Pfenning Lecture 5 September 8, 2009 1 Introduction In this lecture, we introduce universal and existential quantification As usual, we

More information

Propositional Logic Review

Propositional Logic Review Propositional Logic Review UC Berkeley, Philosophy 142, Spring 2016 John MacFarlane The task of describing a logical system comes in three parts: Grammar Describing what counts as a formula Semantics Defining

More information

Performance evaluation of binary classifiers

Performance evaluation of binary classifiers Performance evaluation of binary classifiers Kevin P. Murphy Last updated October 10, 2007 1 ROC curves We frequently design systems to detect events of interest, such as diseases in patients, faces in

More information

On the Amount of Information Resulting from Empirical and Theoretical Knowledge

On the Amount of Information Resulting from Empirical and Theoretical Knowledge On the Amount of Information Resulting from Empirical and Theoretical Knowledge Igor VAJDA, Arnošt VESELÝ, and Jana ZVÁROVÁ EuroMISE Center Institute of Computer Science Academy of Sciences of the Czech

More information

Introduction to Signal Detection and Classification. Phani Chavali

Introduction to Signal Detection and Classification. Phani Chavali Introduction to Signal Detection and Classification Phani Chavali Outline Detection Problem Performance Measures Receiver Operating Characteristics (ROC) F-Test - Test Linear Discriminant Analysis (LDA)

More information

Data Mining: Concepts and Techniques. (3 rd ed.) Chapter 8. Chapter 8. Classification: Basic Concepts

Data Mining: Concepts and Techniques. (3 rd ed.) Chapter 8. Chapter 8. Classification: Basic Concepts Data Mining: Concepts and Techniques (3 rd ed.) Chapter 8 1 Chapter 8. Classification: Basic Concepts Classification: Basic Concepts Decision Tree Induction Bayes Classification Methods Rule-Based Classification

More information

Are the Digits in a Mersenne Prime Random? A Probability Model

Are the Digits in a Mersenne Prime Random? A Probability Model Are the in a Are the in a Prime Random? October 11, 2016 1 / 21 Outline Are the in a 1 2 3 4 5 2 / 21 Source Are the in a This talk is my expansion of the blog post: Strings of in, gottwurfelt.com, Jan

More information

Logic. Propositional Logic: Syntax

Logic. Propositional Logic: Syntax Logic Propositional Logic: Syntax Logic is a tool for formalizing reasoning. There are lots of different logics: probabilistic logic: for reasoning about probability temporal logic: for reasoning about

More information

HOW TO WRITE PROOFS. Dr. Min Ru, University of Houston

HOW TO WRITE PROOFS. Dr. Min Ru, University of Houston HOW TO WRITE PROOFS Dr. Min Ru, University of Houston One of the most difficult things you will attempt in this course is to write proofs. A proof is to give a legal (logical) argument or justification

More information

A Logical Formulation of the Granular Data Model

A Logical Formulation of the Granular Data Model 2008 IEEE International Conference on Data Mining Workshops A Logical Formulation of the Granular Data Model Tuan-Fang Fan Department of Computer Science and Information Engineering National Penghu University

More information

Performance Evaluation and Hypothesis Testing

Performance Evaluation and Hypothesis Testing Performance Evaluation and Hypothesis Testing 1 Motivation Evaluating the performance of learning systems is important because: Learning systems are usually designed to predict the class of future unlabeled

More information