<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Attribute exploration with fuzzy attributes and background knowledge</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Cynthia</forename><forename type="middle">Vera</forename><surname>Glodeanu</surname></persName>
							<email>cynthia-vera.glodeanu@tu-dresden.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Technische Universität Dresden</orgName>
								<address>
									<postCode>01062</postCode>
									<settlement>Dresden</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Attribute exploration with fuzzy attributes and background knowledge</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">EDB6C14AC3956A82EA94EB549325AC4E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T04:39+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Knowledge discovery</term>
					<term>Formal Concept Analysis</term>
					<term>Fuzzy data</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Attribute exploration is a formal concept analytical tool for knowledge discovery by interactive determination of the implications holding between a given set of attributes. The corresponding algorithm queries the user in an efficient way about the implications between the attributes. The result of the exploration process is a representative set of examples for the entire theory and a set of implications from which all implications that hold between the considered attributes can be deduced. The method was successfully applied in different real-life applications for discrete data. In many instances, the user may know some implications before the exploration starts. These are considered as background knowledge and their usage shortens the exploration process. In this paper we show that the handling of background information can be generalised to the fuzzy setting.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Attribute exploration <ref type="bibr">[1]</ref> allows the interactive determination of the implications holding between the attributes of a given context. However, there are situations when the object set of a context is too large (possibly infinite) or difficult to enumerate. With the examples (possibly none) of our knowledge we build the object set of the context step-by-step. The stem base of this context, that is a minimal set of non-redundant implications from which all the implications of the context follow, is built stepwise and we are asked whether the implications of the base are true. If an implication holds, then it is added to the stem base. If however, an implication does not hold, then we have to provide a counterexample. While performing an attribute exploration we have to be able to distinguish between true and false implications and to provide correct counterexamples for false implications. This is a crucial point since the algorithm is naive and will believe whatever we tell it. Once a decision was taken about the validity of an implication, the choice cannot be reversed. Therefore, the counterexamples may not contradict the so-far confirmed implications. The procedure ends when all implications of the current stem base hold in general. This way we obtain an object set which is representative for the entire theory, that may also be infinite.</p><p>The exploration process can be shortened by taking some background knowledge <ref type="bibr" target="#b7">[2]</ref> into account that the user has at the beginning of the exploration.</p><p>As many data sets contain fuzzy data, it is a natural wish to generalise attribute exploration to the fuzzy setting. In <ref type="bibr" target="#b8">[3]</ref> we have already shown how this can be done. It turned out that we have to make some restrictions on the implications (using the globalisation as the hedge) in order to be able to perform a successful attribute exploration. In this paper we generalise the fuzzy attribute exploration to the case with background knowledge. The main work starts in Section 3 where we show how non-redundant bases can be obtained while using background knowledge. The theory for the exploration is developed in Section 4 including an appropriate algorithm. In Section 5 we use a real-world data set to illustrative both exploration with and without background knowledge.</p><p>It should be mentioned that there is some overlap with results presented in the authors PhD thesis <ref type="bibr">[4]</ref>, see Chapter 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Crisp Attribute Exploration</head><p>We assume basic familiarities with Formal Concept Analysis <ref type="bibr">[1]</ref>.</p><p>In the introductory section we have already explained the principle of attribute exploration. However, we have not yet presented its key to success. This is, why we do not have to reconsider already confirmed implications after adding new objects to the context.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proposition 1. ([1]</head><p>) Let K be a context and P 1 , P 2 , . . . , P n be the first n pseudointents of K with respect to the lectic order. If K is extended by an object g the object intent g ↑ of which respects the implications P i → P ↓↑ i , i ∈ {1, . . . , n}, then P 1 , P 2 , . . . , P n are also the lectically first n pseudo-intents of the extended context.</p><p>Attribute exploration was successfully applied in both theoretical and practical research domains. On the one hand it facilitated the discovery of implications between properties of mathematical structures, see for example <ref type="bibr" target="#b10">[5]</ref><ref type="bibr" target="#b11">[6]</ref><ref type="bibr">[7]</ref>. On the other hand it was also used in real-life scenarios, for instance in chemistry <ref type="bibr">[8]</ref>, information systems <ref type="bibr">[9]</ref>, etc.</p><p>In case the user knows some implications between the attributes in advance, attribute exploration with background knowledge <ref type="bibr" target="#b15">[10,</ref><ref type="bibr" target="#b7">2]</ref> can be applied. Using background knowledge in the exploration will considerably reduce the time of the process as the user has to answer less questions and provide less counterexamples.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Formal Fuzzy Concept Analysis</head><p>Due to lack of space we omit the introduction of some basic notions from fuzzy logic, fuzzy sets and Fuzzy Formal Concept Analysis. We assume that the reader is familiar with these notions and refer to standard literature. For fuzzy theory we refer to <ref type="bibr">[11,</ref><ref type="bibr" target="#b17">12]</ref>, in particular, notions like residuated lattices with hedges and L-sets can be found for instance in <ref type="bibr" target="#b18">[13]</ref>. For Fuzzy Formal Concept Analysis see <ref type="bibr" target="#b19">[14,</ref><ref type="bibr" target="#b20">15]</ref> but also <ref type="bibr" target="#b21">[16,</ref><ref type="bibr" target="#b22">17]</ref>. The theory about Fuzzy Formal Concept Analysis with hedges can be found in <ref type="bibr" target="#b18">[13]</ref>. In this section we only present some notions concerning lectic order, attribute implications and the computation of their nonredundant bases.</p><p>We start with the fuzzy lectic order <ref type="bibr" target="#b23">[18]</ref> which is defined as follows: Let L = {l 0 &lt; l 1 &lt; • • • &lt; l n = 1} be the support set of some linearly ordered residuated lattice and M = {1, 2, . . . , m} the attribute set of an L-context (G, M, I). For (x, i), (y, j) ∈ M × L, we write (x, l i ) ≤ (y, l j ) :⇐⇒ (x &lt; y) or (x = y and l i ≥ l j ).</p><p>We define</p><formula xml:id="formula_0">B ⊕ (x, i) := ((B ∩ {1, 2, . . . , x − 1}) ∪ { li /x}) ↓↑ for B ∈ L M and (x, i) ∈ M × L. Furthermore, for B, C ∈ L M , we define B &lt; (x,i) C by B ∩ {1, . . . , x − 1} = C ∩ {1, . . . , x − 1} and B(x) &lt; C(x) = l i .<label>(1)</label></formula><p>We say that B is lectically smaller than C, written B &lt; C, if B &lt; (x,i) C for some (x, i) satisfying <ref type="bibr">(1)</ref>. As in the crisp case, we have that B + := B ⊕ (x, i) is the least intent which is greater than a given B with respect to &lt; and (x, i) is the greatest with B &lt; (x,i) B ⊕ (x, i) (for details we refer to <ref type="bibr" target="#b23">[18]</ref>).</p><p>Fuzzy Implications and Non-redundant Bases. Fuzzy attribute implications were studied in a series of papers by Bělohlávek and Vychodil <ref type="bibr" target="#b24">[19,</ref><ref type="bibr" target="#b25">20]</ref>. We denote by S(A, B) the truth value of "the L-set A is a subset of the L-set B". Futher, (−) * denotes the hedge of a residuated lattice L, i.e., (−) * : L → L is a map satisfying a * ≤ a, (a → b) * ≤ a * → b * , a * * = a * and 1 * = 1 for every a, b ∈ L. Typical examples for the hedge are the identity, i.e., a * := a for all a ∈ L, and the globalisation, i.e., a * := 0 for all a ∈ L \ {1} and a * := 1 if and only if a = 1.</p><p>A fuzzy attribute implication (over the attribute set M ) is an expression A ⇒ B, where A, B ∈ L M . The verbal meaning of A ⇒ B is: "if it is (very) true that an object has all attributes from A, then it also has all attributes from B". The notions "being very true", "to have an attribute", and the logical connective "if-then" are determined by the chosen L. For an</p><formula xml:id="formula_1">L-set N ∈ L M of attributes, the degree ||A ⇒ B|| N ∈ L to which A ⇒ B is valid in N is defined as ||A ⇒ B|| N := S(A, N ) * → S(B, N ).</formula><p>If N is the L-set of all attributes of an object g, then ||A ⇒ B|| N is the truth degree to which A ⇒ B holds for g.</p><formula xml:id="formula_2">For N ⊆ L M , the degree ||A ⇒ B|| N ∈ L to which A ⇒ B holds in N is defined by ||A ⇒ B|| N := N ∈N ||A ⇒ B|| N . For an L-context (G, M, I), let I g ∈ L M (g ∈ G) be an L-set of attributes such that I g (m) = I(g, m) for each m ∈ M . Clearly, I g corresponds to the row labelled g in (G, M, I). We define the degree ||A ⇒ B|| (G,M,I) ∈ L to which A ⇒ B holds in (each row of) K = (G, M, I) by ||A ⇒ B|| K := ||A ⇒ B|| N , where N := {I g | g ∈ G}. Denote by Int(G * , M, I) the set of all intents of B(G * , M, I). The degree ||A ⇒ B|| B(G * ,M,I) ∈ L to which A ⇒ B holds in (the intents of) B(G * , M, I) is defined by ||A ⇒ B|| B(G * ,M,I) := ||A ⇒ B|| Int(G * ,M,I) .</formula><p>(2)</p><formula xml:id="formula_3">Lemma 1. ([20]) For each fuzzy attribute implication A ⇒ B it holds that ||A ⇒ B|| (G,M,I) = ||A ⇒ B|| B(G * ,M,I) = S(B, A ↓↑ ).</formula><p>Due to the large number of implications in a formal context, one is interested in the stem base of the implications. Neither the existence nor the uniqueness of the stem base for a given L-context are guaranteed in general <ref type="bibr" target="#b25">[20]</ref>.</p><p>Let T be a set of fuzzy attribute implications. An L-set of attributes</p><formula xml:id="formula_4">N ∈ L M is called a model of T if ||A ⇒ B|| N = 1 for each A ⇒ B ∈ T . The set of all models of T is denoted by Mod(T ) := {N ∈ L M | N is a model of T }. The degree ||A ⇒ B|| T ∈ L to which A ⇒ B semantically follows from T is defined by ||A ⇒ B|| T := ||A ⇒ B|| Mod(T ) . T is called complete in (G, M, I) if ||A ⇒ B|| T = ||A ⇒ B|| (G,M,I) for each A ⇒ B. If T is complete and no proper subset of T is complete, then T is called a non-redundant basis. Theorem 1. ([20]) T is complete iff Mod(T ) = Int(G * , M, I).</formula><p>As in the crisp case the stem base of a given L-context can be obtained through the pseudo-intents. P ⊆ L M is called a system of pseudo-intents if for each P ∈ L M we have: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Adding background knowledge to the stem base</head><p>The user may know some implications between attributes in advance. We will call such kind of implications background implications. In this section we will focus on finding a minimal list of implications, which together with the background implications will describe the structure of the concept lattice.</p><p>The theory about background knowledge for the crisp case was developed in <ref type="bibr" target="#b7">[2]</ref> and a more general form of it in <ref type="bibr" target="#b15">[10]</ref>. The results from <ref type="bibr" target="#b7">[2]</ref> for implication bases with background knowledge follow by some slight modifications of the results about implication bases without background knowledge presented in <ref type="bibr">[1]</ref>. The same applies for the fuzzy variant of this method. Hence, if we choose the empty set as the background knowledge, we obtain the results from <ref type="bibr" target="#b24">[19,</ref><ref type="bibr" target="#b25">20]</ref>.</p><p>We start by investigating the stem bases of L-contexts relative to a set of background implications. Afterwards we show how some notions and results for fuzzy implications and their stem bases change for our new setting.</p><p>The attribute sets of L-contexts and the residuated lattices L will be considered finite. Further, L is assumed to be linearly ordered. Definition 1. Let K be a finite L-context and let L be a set of background attribute implications. A set B of fuzzy attribute implications of K is called Lcomplete if every implication of K is entailed by L ∪ B. We call B, L-non-</p><formula xml:id="formula_5">redundant if no implication A ⇒ B from B is entailed by (B \ {A ⇒ B}) ∪ L.</formula><p>If B is both L-complete and L-non-redundant, it is called an L-base.</p><p>Note that if we have L = ∅ in the above definition, then all L-notions are actually the notions introduced for sets of fuzzy implications. This remark holds also for the other notions introduced in this section.</p><p>For any set L of background attribute implications and any attribute L-set X ∈ L M we define an L-set X L ∈ L M and an L-set X Ln ∈ L M for each non-negative integer n by</p><formula xml:id="formula_6">X L := X ∪ {B ⊗ S(A, X) * | A ⇒ B ∈ L}, X Ln := X, n = 0, (X Ln−1 ) L , n ≥ 1.</formula><p>An operator L on these sets is defined by</p><formula xml:id="formula_7">L(X) := ∞ n=0 X Ln .<label>(3)</label></formula><p>From <ref type="bibr" target="#b25">[20]</ref> we know that L(−) is an L * -closure operator for a finite set M of attributes and a finite residuated lattice L. As in the case without background knowledge, the usage of the globalisation simplifies the definition of the system of L-pseudo-intents. We have that P ⊆ L M is a system of pseudo-intents if P ∈ P ⇐⇒ (P = L(P ) = P ↓↑ and Q ↓↑ ⊆ P for each Q ∈ P with Q P ). </p><formula xml:id="formula_8">||N ⇒ N ↓↑ || N = S(N, N ) * → S(N ↓↑ , N ) = 1 * → S(N ↓↑ , N ) = S(N ↓↑ , N ) = 1,</formula><p>which is a contradiction because N does not respect this implication.</p><p>To finish the proof, we still have to show that B L is L-non-redundant. To this end let P ⇒ P ↓↑ ∈ B L . We show that this implication is not entailed by L := (B L \ {P ⇒ P ↓↑ }) ∪ L. As P = L(P ), it is obviously a model of L. We have ||Q ⇒ Q|| P = 1 for every L-pseudo-intent Q ∈ P different from P since P is an L-pseudo-intent. Therefore, P ∈ Mod(L). We also have that ||P ⇒ P ↓↑ || P = S(P ↓↑ , P ) = 1 and thus P is not a model of B L ∪ L. Hence, we have</p><formula xml:id="formula_9">||P ⇒ P ↓↑ || (G,M,I) = ||P ⇒ P ↓↑ || B L ∪L = ||P ⇒ P ↓↑ || L , showing that L is not complete and thus B L ∪ L is non-redundant.</formula><p>In general we write P ⇒ P ↓↑ \ {m ∈ M | P (m) = P ↓↑ (m)} instead of P ⇒ P ↓↑ .</p><p>Note that computing the stem-base and closing the implications from it with respect to the operator L(−) will yield a different set of implications than the L-stem-base. Let us take a look at the following example.</p><p>Example 1. Consider the L-context given in Figure <ref type="figure" target="#fig_4">1</ref>. In order to ensure that its stem-base and L-stem-base exist, we use the globalisation. Further, we use the Gödel logic. The stem-base is displayed in the left column of  For developing our theory about fuzzy attribute exploration with background knowledge, the following results are useful. First, the set of all intents and all L-pseudo-intents is an L * -closure system, as stated below. Due to lack of space we omit the proofs of the following two lemmas. Lemma 2. Let (G, M, I) be an L-context, let L be a set of fuzzy implications of (G, M, I). Further, let P and Q be intents or L-pseudo-intents such that S(P, Q) * ≤ S(P ↓↑ , P ∩ Q) and S(Q, P ) * ≤ S(Q ↓↑ , P ∩ Q).</p><p>Then, P ∩ Q is an intent.</p><p>Note that if we choose the globalisation for (−) * , then P ∩ Q is an intent provided that P and Q are (L-pseudo-)intents with P Q and Q P . Now we are interested in the closure of an L-set with respect to the implications of the L-base B L . Therefore, we first define for each L-set X ∈ L M and each non-negative integer n the L-sets X L • , X L • n ∈ L M as follows:</p><formula xml:id="formula_10">X L • := X ∪ {B ⊗ S(A, X) * | A ⇒ B ∈ B L , A = X}, X L • n := X, n = 0, (X L • n−1 ) L • , n ≥ 1.</formula><p>Further, we define an operator L • (−) on these sets by</p><formula xml:id="formula_11">L • (X) := ∞ n=0 X L • n .<label>(4)</label></formula><p>Lemma 3. If (−) * is the globalisation, then L • given by ( <ref type="formula" target="#formula_11">4</ref>) is an L * -closure operator and {L • (X) | X ∈ L M } coincides with the set of all L-pseudo-intens and intents of (G, M, I).</p><p>Remark 1. Note that for a general hedge, L • (−) does not need be an L * -closure operator. For instance, choose the Goguen structure and the identity for the hedge (−) * . Further, let L := { 0.3 /y ⇒ y}. Then,</p><formula xml:id="formula_12">L • ({ 0.2 /y})(y) ≥ ({ 0.2 /y}) L • (y) = { 0.2 /y} ∪ {y ⊗ (0.3 → 0.2)} = { 0.2 /y} ∪ { 0.(66) /y} = { 0.(66) /y}, and L • ({ 0.3 /y})(y) = { 0.3 /y}. Hence, L • (−) does not satisfy the monotony prop- erty, because we have { 0.2 /y} ⊆ { 0.3 /y} but L • ({ 0.2 /y}) L • ({ 0.3 /y}).</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Attribute exploration with background knowledge</head><p>Particularly appealing is the usage of background knowledge in the exploration process. This proves itself to be very useful and time saving for the user. He/she will have to answer less questions, as the algorithm does not start from scratch. Due to Remark 1 and the fact that we are only able to perform a successful attribute exploration if the chosen hedge is the globalisation, we will consider only this hedge in this section. In order to arrive at the exploration with background knowledge we will present the lectic order, the "key proposition" and an appropriate algorithm for attribute exploration in this setting.</p><p>The lectic order is defined analogously as in Section 2, see <ref type="bibr">(1)</ref>. The only difference lies in the definition of "⊕". This time we are using the L * -closure operator (−) L • instead of (−) ↓↑ .</p><p>Theorem 4. The lectically first intent or L-pseudo-intent is ∅ L • . For a given L-set A ∈ L M , the lectically next intent or L-pseudo-intent is given by the L-set A⊕(m, l), where (m, l) ∈ M ×L is the greatest tuple such that A &lt; (m,l) A⊕(m, l). The lectically last intent or L-pseudo-intent is M . Now we are prepared to present the main proposition regarding attribute exploration with background knowledge in a fuzzy setting.</p><p>Proposition 2. Let L be a finite, linearly ordered residuated lattice with globalisation. Further, let P be the unique system of L-pseudo-intents of a finite L-context K with P 1 , . . . , P n ∈ P being the first n L-pseudo-intents in P with respect to the lectic order. If K is extended by an object g, the object intent g ↑ of which respects the implications from L ∪ {P i ⇒ P ↓↑ i | i ∈ {1, . . . , n}}, then P 1 , . . . , P n remain the lectically first n L-pseudo-intents of the extended context.</p><p>Proof. Let K = (H, M, J) be the initial context and let (G, M, I) be the extended context, namely G = H ∪ {g} and J = I ∩ (H × M ). To put it briefly, since g I is a model of P i ⇒ P JJ i for all i ∈ {1, . . . , n} we have that P JJ i = P II i . By the definition of L-pseudo-intents and the fact that every L-pseudo-intent Q of (H, M, J) with Q ⊂ P i is lectically smaller than P i , we have that P 1 , . . . , P n are the lectically first n L-pseudo-intents of (G, M, I).</p><p>We now have the key to a successful attribute exploration with background knowledge in the fuzzy setting, at least when we use the globalisation. With this result we are able to generalise the attribute exploration algorithm as presented by Algorithm 1. Its input is the L-context K, the residuated lattice L and the set of background implications L. The first intent or L-pseudo-intent is the empty set. If it is an intent, add it to the set of intents of the context. Otherwise, ask the expert whether the implication is true in general. If so, add this implication to the L-stem base, otherwise ask for a counterexample and add it to the context (line 2 − 11). Until A is different from M , repeat the following steps: Search for the largest attribute i in M with its largest value l such that A(i) &lt; l. For this attribute compute its closure with respect to the L • (−)-closure operator given by ( <ref type="formula" target="#formula_11">4</ref>) and check whether the result is the lectically next intent or L-pseudointent (line 12 − 16). Thereby, A i := A ∩ {1, . . . , i − 1}. In lines 17 − 25 we repeat the same procedure as in lines 2 − 11.</p><p>The algorithm generates interactively the L-stem base of the L-context. We enumerate the intents and pseudo-intents in the lectic order. Due to Proposition 2 we are allowed to extend the context by objects whose object intents respect the already confirmed implications. This way, the L-pseudo-intents already contained in the stem base do not change. Hence, the algorithm is sound and correct. from others that the implications {a, b} ⇒ c, d ⇒ { 0.5 /a, e}, {a, e} ⇒ {c, d} and a ⇒ { 0.5 /b, 0.5 /c, 0.5 /e} hold. These will be considered the set of background implications L. The exploration process is displayed in the left column of Figure <ref type="figure" target="#fig_2">3</ref>. The first L-pseudo-intent is ∅ and we ask the expert whether ∅ ⇒ ∅ ↓↑ holds. This is not the case and a counterexample is Uni Bochum. For implications that hold, for instance in step no. 3, the expert answers just "yes" and the implication is added to the L-base. Afterwards, the validity of the implication induced by the next L-pseudo-intent is asked, and so on. The algorithm continues until we reach M as an intent or L-pseudo-intent. In our case, however, the algorithm stops at step no. 10. This is due to the fact that the implications induced by the L-pseudo-intents after {b, 0.5 /d} are confirmed by the implications from the background knowledge. The result of the exploration is an extended context, namely that contains our initial examples and the counterexamples we (or the expert) has entered. We also obtain an L-base consisting of the background implications L and the implications we have confirmed during the exploration process.</p><p>In the right column of Figure <ref type="figure" target="#fig_2">3</ref> the exploration without background knowledge is displayed. One immediately sees that there are 4 additional steps. The first difference between the explorations appears in step no. 8. Without using background knowledge we have to answer the implication from the right column, while this implication is already confirmed if we use background knowledge. The exploration without background knowledge yields the same extended context whereas the stem base contains the implications we have confirmed during the process.</p><p>Fig. <ref type="figure" target="#fig_2">3</ref>. Exploration with and without background knowledge.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>P</head><label></label><figDesc>∈ P ⇐⇒ (P = P ↓↑ and ||Q ⇒ Q ↓↑ || P = 1 for each Q ∈ P with Q = P ). Theorem 2. ([20]) T := {P ⇒ P ↓↑ | P ∈ P} is complete and non-redundant. If (−) * is the globalisation, then T is unique and minimal.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Definition 2 .</head><label>2</label><figDesc>For an L-context (G, M, I), a subset P ⊆ L M is called a system of L-pseudo-intents of (G, M, I) if for each P ∈ L M the following holds P ∈ P ⇐⇒ (P = L(P ) = P ↓↑ and ||Q ⇒ Q ↓↑ || P = 1 for each Q ∈ P : Q = P ).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Theorem 3 .</head><label>3</label><figDesc>The set B L := {P ⇒ P ↓↑ | P is an L-pseudo-intent} is an L-base of K. We call it the L-Duquenne-Guigues-base or the L-stem base.Proof. First note that all implications from B L are implications of (G, M, I). We start by showing that B L is complete, i.e., ||A ⇒ B|| B L ∪L = ||A ⇒ B|| (G,M,I) for every fuzzy implication A ⇒ B. By Equation (2) follows ||A ⇒ B|| (G,M,I) = ||A ⇒ B|| Int(G * ,M,I) . Hence, it is sufficient to prove that ||A ⇒ B|| B L ∪L = ||A ⇒ B|| Int(G * ,M,I) for every fuzzy attribute implication A ⇒ B. For any L-set N ∈ L M , N ⇒ L(N ) is entailed by L, therefore we have N = L(N ). Each intent N ∈ Int(G * , M, I) is a model of B L . Now let N ∈ Mod(B L ) and assume that N = N ↓↑ , i.e., N is not an intent. Since N ∈ Mod(B L ) we have ||Q ⇒ Q ↓↑ || N = 1 for every L-pseudo-intent Q ∈ P. By definition, N is an L-pseudo-intent and hence N ⇒ N ↓↑ belongs to B L . But now, we have</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 1 . 5 /</head><label>15</label><figDesc>For the background implications L := {b ⇒ a, d ⇒ a, {a, c} ⇒ b} we obtain the L-stembase displayed in the middle column of the figure. If we close the pseudo-intents a ⇒ a, d ⇒ a, b, c, c, 0.5 /d ⇒ a, b, d, a, d ⇒ b, c, c, 0.5 /d ⇒ a, b, d, a, 0.5 /d ⇒ b, c, d, c, 0.5 /d ⇒ a, b, d, b ⇒ a, c, d, a, d ⇒ b, c, a, b ⇒ c, d, a, 0.5 /d ⇒ b, c, d, a, b ⇒ c, d. a, 0.5 /d ⇒ b, c, d, a, c ⇒ b, d. a, b, c ⇒ d.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. An L-context and its different stem bases.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 2 .</head><label>2</label><figDesc>Fig.2. The data is an extract from the data published in the journal Zeit Campus in January 2013. The whole data can be found under https://bit.ly/ZCinsr-informatik.</figDesc></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Illustrative example</head><p>For our illustrative example we will consider the data from Figure <ref type="figure">2</ref>. The objects are different universities from Germany and the attributes are indicators rating these institutions. Study situation overall: M.Sc. students were asked about their overall rating of their studies. IT-infrastructure: the availability of subject-specific software, PC pools and wifi were taken into account. Courses offered: amount of courses and the interdisciplinary references were relevant. Possibility of studying: timing of the courses and content of the curriculum were decisive. Passage to M.Sc.: clearly formulated admission requirements and assistance of the students with the organisational issues were relevant.</p><p>Suppose we want to explore the implications between the attributes from the L-context from Figure <ref type="figure">2</ref>. We also know some examples, namely the TUs. These will be the objects of the L-context we start with. Further, we heard</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Q</forename></persName>
		</author>
		<idno>0.5 /a, 0.5 /c, 0.5 /d} Q</idno>
		<imprint/>
	</monogr>
	<note>: {} ⇒ { 0.5 /a, 0.5 /c, 0.5 /d} E: no, ex. Uni Bochum E: no, ex. Uni Bochum 2 Q: {} ⇒ { 0.5 /c, 0.5 /d} Q: {} ⇒ { 0.5 /c, 0.5 /d} E: no, ex. Uni Duisburg E: no, ex. Uni Duisburg 3 Q: {} ⇒ 0.5 /d Q: {} ⇒ 0.5 /d E: yes E: yes</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title/>
		<idno>0.5 /e} ⇒ 0.5 /b Q: { 0.5 /d, 0.5 /e} ⇒ 0.5 /</idno>
	</analytic>
	<monogr>
		<title level="j">Q</title>
		<imprint/>
	</monogr>
	<note>b E: no, ex. Uni Bielefeld E: no, ex. Uni Bielefeld 5 Q: { 0.5 /b, 0.5 /d} ⇒ 0.5 /e Q: { 0.5 /b, 0.5 /d} ⇒ 0.5 /e E: no, ex. Uni Erlangen E: no, ex. Uni Erlangen 6 Q: { 0.5 /d, e} ⇒ 0.5 /c Q: { 0.5 /d, e} ⇒ 0.5 /c E: yes E: yes</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">Q</title>
		<imprint/>
		<respStmt>
			<orgName>Uni Saarbrücken</orgName>
		</respStmt>
	</monogr>
	<note>0.5 /b, 0.5 /c, 0.5 /d. ⇒ b Q: { 0.5 /a, 0.5 /b, 0.5 /c, 0.5 /d, e} ⇒ b E: no, ex. Uni Saarbrücken E: no, ex</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Q</forename></persName>
		</author>
		<imprint>
			<pubPlace>Uni Heidelberg E</pubPlace>
		</imprint>
	</monogr>
	<note>0.5 /a, 0.5 /b, 0.5 /c, d, e} ⇒ {a, c} Q: d ⇒ { 0.5 /a, 0.5 /c, e} E: no, ex</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">Uni Heidelberg</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">5</biblScope>
		</imprint>
	</monogr>
	<note>Q: {c. Q: {b, 0.5 /d} ⇒ { 0.5 /a, 0.5 /c} Q: {c, 0.5 /d} ⇒ {a, 0.5 /b, d, 0.5 /e} E: yes E: yes exploration stopped</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">Q</title>
		<imprint/>
	</monogr>
	<note>0.5 /a, 0.5 /c, 0.5 /e} E: yes 12 Q: {a, 0.5 /d} ⇒ { 0.5 /b, 0.5 /c, 0.5 /e} E: yes 13 Q: {a, 0.5 /b, 0.5 /c, 0.5 /d, e} ⇒ {c. yes 14 Q: {a, b 0.5 /c, 0.5 /d, 0.5 /e} ⇒ {c, d, e} E: yes exploration stopped</note>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<title level="m">Formale Begriffsanalyse: Mathematische Grundlagen</title>
				<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Attribute exploration with background implications and exceptions</title>
		<author>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Data Analysis and Information Systems. Statistical and Conceptual approaches. Proc. GfKl&apos;95. Studies in Classification, Data Analysis, and Knowledge Organization 7</title>
				<editor>
			<persName><forename type="first">H</forename><forename type="middle">H</forename><surname>Bock</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Polasek</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1996">1996</date>
			<biblScope unit="page" from="457" to="469" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Attribute exploration in a fuzzy setting</title>
		<author>
			<persName><forename type="first">C</forename><surname>Glodeanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Contributions to International Conference on Formal Concept Analysis</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Domenach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Ignatov</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Poelmans</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
		<respStmt>
			<orgName>Katholieke Universiteit Leuven</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Conceptual Factors and Fuzzy Data</title>
		<author>
			<persName><forename type="first">C</forename><surname>Glodeanu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
		<respStmt>
			<orgName>TU Dresden</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Towards a theory of contextual topology</title>
		<author>
			<persName><forename type="first">C</forename><surname>Sacarea</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<pubPlace>Aachen</pubPlace>
		</imprint>
		<respStmt>
			<orgName>TH Darmstadt</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Generalizations of Boolean algebras. an attribute exploration</title>
		<author>
			<persName><forename type="first">L</forename><surname>Kwuida</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Pech</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Reppe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math. Slovaca</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="145" to="165" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Attribute exploration of properties of functions on ordered sets</title>
		<author>
			<persName><forename type="first">A</forename><surname>Revenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proc. CLA</title>
		<imprint>
			<biblScope unit="page" from="313" to="324" />
			<date type="published" when="2010">2010. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Exploration of nmr data of glasses by means of formal concept analysis</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">G</forename><surname>Bartel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nofz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Chemom. Intell. Lab. Syst</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="53" to="63" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Acquiring expert knowledge for the design of conceptual information systems</title>
		<author>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">EKAW</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">D</forename><surname>Fensel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Studer</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="volume">1621</biblScope>
			<biblScope unit="page" from="275" to="290" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Attribute exploration with background knowledge</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">217</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="215" to="233" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">The Metamathematics of Fuzzy Logic</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hájek</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1998">1998</date>
			<publisher>Kluwer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Fuzzy sets and fuzzy logic -theory and applications</title>
		<author>
			<persName><forename type="first">G</forename><surname>Klir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Yuan</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1995">1995</date>
			<publisher>Prentice Hall P T R</publisher>
			<biblScope unit="page">7458</biblScope>
			<pubPlace>Upper Saddle River, New Jersey</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Fuzzy concept lattices constrained by hedges</title>
		<author>
			<persName><forename type="first">R</forename><surname>Belohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JACIII</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="536" to="545" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">Formale Begriffsanalyse mit unscharfen Begriffen</title>
		<author>
			<persName><forename type="first">S</forename><surname>Umbreit</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1994">1994</date>
		</imprint>
		<respStmt>
			<orgName>Martin-Luther-Universitaet Halle-Wittenberg</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Fuentes-Gonzales: The study of L-Fuzzy Concept Lattice</title>
		<author>
			<persName><forename type="first">A</forename><surname>Burusco</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathware and soft computing</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="209" to="218" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Fuzzy Begriffe</title>
		<author>
			<persName><forename type="first">S</forename><surname>Pollandt</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1997">1997</date>
			<publisher>Springer Verlag</publisher>
			<pubPlace>Berlin Heidelberg New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Fuzzy Relational Systems: Foundations and Principles</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>Kluwer Academic/Plenum Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Algorithms for fuzzy concept lattices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Recent Advances in Soft Computing</title>
				<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="200" to="205" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Attribute implications in a fuzzy setting</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Formal Concept Analysis</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Schmid</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="45" to="60" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Fuzzy attribute logic: attribute implications, their validity, entailment, and non-redundant basis</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bělohlávek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Volume 1 of Fuzzy Logic, Soft Computing &amp; Computational Intelligence</title>
				<editor>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Chen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Ying</surname></persName>
		</editor>
		<imprint>
			<publisher>Tsinghua University Press and Springer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="622" to="627" />
		</imprint>
	</monogr>
	<note>Eleventh International Fuzzy Systems Association World Congress</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
