=Paper=
{{Paper
|id=None
|storemode=property
|title=Attribute Exploration with Fuzzy Attributes and Background Knowledge
|pdfUrl=https://ceur-ws.org/Vol-1062/paper6.pdf
|volume=Vol-1062
|dblpUrl=https://dblp.org/rec/conf/cla/Glodeanu13
}}
==Attribute Exploration with Fuzzy Attributes and Background Knowledge==
Attribute exploration with fuzzy attributes and
background knowledge
Cynthia Vera Glodeanu
Technische Universität Dresden,
01062 Dresden, Germany
Cynthia-Vera.Glodeanu@tu-dresden.de
Abstract. Attribute exploration is a formal concept analytical tool for
knowledge discovery by interactive determination of the implications
holding between a given set of attributes. The corresponding algorithm
queries the user in an efficient way about the implications between the
attributes. The result of the exploration process is a representative set
of examples for the entire theory and a set of implications from which all
implications that hold between the considered attributes can be deduced.
The method was successfully applied in different real-life applications for
discrete data. In many instances, the user may know some implications
before the exploration starts. These are considered as background knowl-
edge and their usage shortens the exploration process. In this paper we
show that the handling of background information can be generalised to
the fuzzy setting.
Keywords: Knowledge discovery, Formal Concept Analysis, Fuzzy data
1 Introduction
Attribute exploration [1] allows the interactive determination of the implications
holding between the attributes of a given context. However, there are situations
when the object set of a context is too large (possibly infinite) or difficult to
enumerate. With the examples (possibly none) of our knowledge we build the
object set of the context step-by-step. The stem base of this context, that is a
minimal set of non-redundant implications from which all the implications of
the context follow, is built stepwise and we are asked whether the implications
of the base are true. If an implication holds, then it is added to the stem base. If
however, an implication does not hold, then we have to provide a counterexample.
While performing an attribute exploration we have to be able to distinguish
between true and false implications and to provide correct counterexamples for
false implications. This is a crucial point since the algorithm is naive and will
believe whatever we tell it. Once a decision was taken about the validity of an
implication, the choice cannot be reversed. Therefore, the counterexamples may
not contradict the so-far confirmed implications. The procedure ends when all
implications of the current stem base hold in general. This way we obtain an
object set which is representative for the entire theory, that may also be infinite.
c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA
2013, pp. 69–80, ISBN 978–2–7466–6566–8, Laboratory L3i, University of La
Rochelle, 2013. Copying permitted only for private and academic purposes.
70 Cynthia Vera Glodeanu
The exploration process can be shortened by taking some background knowledge
[2] into account that the user has at the beginning of the exploration.
As many data sets contain fuzzy data, it is a natural wish to generalise
attribute exploration to the fuzzy setting. In [3] we have already shown how
this can be done. It turned out that we have to make some restrictions on the
implications (using the globalisation as the hedge) in order to be able to perform
a successful attribute exploration. In this paper we generalise the fuzzy attribute
exploration to the case with background knowledge. The main work starts in
Section 3 where we show how non-redundant bases can be obtained while using
background knowledge. The theory for the exploration is developed in Section 4
including an appropriate algorithm. In Section 5 we use a real-world data set to
illustrative both exploration with and without background knowledge.
It should be mentioned that there is some overlap with results presented in
the authors PhD thesis [4], see Chapter 5.
2 Preliminaries
2.1 Crisp Attribute Exploration
We assume basic familiarities with Formal Concept Analysis [1].
In the introductory section we have already explained the principle of at-
tribute exploration. However, we have not yet presented its key to success. This
is, why we do not have to reconsider already confirmed implications after adding
new objects to the context.
Proposition 1. ([1]) Let K be a context and P1 , P2 , . . . , Pn be the first n pseudo-
intents of K with respect to the lectic order. If K is extended by an object g the
object intent g ↑ of which respects the implications Pi → Pi↓↑ , i ∈ {1, . . . , n},
then P1 , P2 , . . . , Pn are also the lectically first n pseudo-intents of the extended
context.
Attribute exploration was successfully applied in both theoretical and prac-
tical research domains. On the one hand it facilitated the discovery of implica-
tions between properties of mathematical structures, see for example [5–7]. On
the other hand it was also used in real-life scenarios, for instance in chemistry
[8], information systems [9], etc.
In case the user knows some implications between the attributes in advance,
attribute exploration with background knowledge [10, 2] can be applied. Using
background knowledge in the exploration will considerably reduce the time of the
process as the user has to answer less questions and provide less counterexamples.
2.2 Formal Fuzzy Concept Analysis
Due to lack of space we omit the introduction of some basic notions from fuzzy
logic, fuzzy sets and Fuzzy Formal Concept Analysis. We assume that the reader
is familiar with these notions and refer to standard literature. For fuzzy theory
Attribute exploration with fuzzy attributes and background knowledge 71
we refer to [11, 12], in particular, notions like residuated lattices with hedges
and L-sets can be found for instance in [13]. For Fuzzy Formal Concept Analysis
see [14, 15] but also [16, 17]. The theory about Fuzzy Formal Concept Analysis
with hedges can be found in [13]. In this section we only present some notions
concerning lectic order, attribute implications and the computation of their non-
redundant bases.
We start with the fuzzy lectic order [18] which is defined as follows: Let
L = {l0 < l1 < · · · < ln = 1} be the support set of some linearly ordered residu-
ated lattice and M = {1, 2, . . . , m} the attribute set of an L-context (G, M, I).
For (x, i), (y, j) ∈ M × L, we write
(x, li ) ≤ (y, lj ) :⇐⇒ (x < y) or (x = y and li ≥ lj ).
We define B ⊕ (x, i) := ((B ∩ {1, 2, . . . , x − 1}) ∪ {li/x})↓↑ for B ∈ LM and
(x, i) ∈ M × L. Furthermore, for B, C ∈ LM , we define B <(x,i) C by
B ∩ {1, . . . , x − 1} = C ∩ {1, . . . , x − 1} and B(x) < C(x) = li . (1)
We say that B is lectically smaller than C, written B < C, if B <(x,i) C for
some (x, i) satisfying (1). As in the crisp case, we have that B + := B ⊕ (x, i) is
the least intent which is greater than a given B with respect to < and (x, i) is
the greatest with B <(x,i) B ⊕ (x, i) (for details we refer to [18]).
Fuzzy Implications and Non-redundant Bases. Fuzzy attribute implica-
tions were studied in a series of papers by Bělohlávek and Vychodil [19, 20].
We denote by S(A, B) the truth value of “the L-set A is a subset of the L-set
B”. Futher, (−)∗ denotes the hedge of a residuated lattice L, i.e., (−)∗ : L → L
is a map satisfying a∗ ≤ a, (a → b)∗ ≤ a∗ → b∗ , a∗∗ = a∗ and 1∗ = 1 for every
a, b ∈ L. Typical examples for the hedge are the identity, i.e., a∗ := a for all
a ∈ L, and the globalisation, i.e., a∗ := 0 for all a ∈ L \ {1} and a∗ := 1 if and
only if a = 1.
A fuzzy attribute implication (over the attribute set M ) is an expression
A ⇒ B, where A, B ∈ LM . The verbal meaning of A ⇒ B is: “if it is (very) true
that an object has all attributes from A, then it also has all attributes from B”.
The notions “being very true”, “to have an attribute”, and the logical connective
“if-then” are determined by the chosen L. For an L-set N ∈ LM of attributes,
the degree ||A ⇒ B||N ∈ L to which A ⇒ B is valid in N is defined as
||A ⇒ B||N := S(A, N )∗ → S(B, N ).
If N is the L-set of all attributes of an object g, then ||A ⇒ B||N is the truth
degree to which A ⇒ B holds for g. For N ⊆ LM , the degreeV ||A ⇒ B||N ∈ L to
which A ⇒ B holds in N is defined by ||A ⇒ B||N := N ∈N ||A ⇒ B||N . For
an L-context (G, M, I), let Ig ∈ LM (g ∈ G) be an L-set of attributes such that
Ig (m) = I(g, m) for each m ∈ M . Clearly, Ig corresponds to the row labelled
g in (G, M, I). We define the degree ||A ⇒ B||(G,M,I) ∈ L to which A ⇒ B
holds in (each row of) K = (G, M, I) by ||A ⇒ B||K := ||A ⇒ B||N , where
72 Cynthia Vera Glodeanu
N := {Ig | g ∈ G}. Denote by Int(G∗ , M, I) the set of all intents of B(G∗ , M, I).
The degree ||A ⇒ B||B(G∗ ,M,I) ∈ L to which A ⇒ B holds in (the intents of)
B(G∗ , M, I) is defined by
||A ⇒ B||B(G∗ ,M,I) := ||A ⇒ B||Int(G∗ ,M,I) . (2)
Lemma 1. ([20]) For each fuzzy attribute implication A ⇒ B it holds that
||A ⇒ B||(G,M,I) = ||A ⇒ B||B(G∗ ,M,I) = S(B, A↓↑ ).
Due to the large number of implications in a formal context, one is interested
in the stem base of the implications. Neither the existence nor the uniqueness of
the stem base for a given L-context are guaranteed in general [20].
Let T be a set of fuzzy attribute implications. An L-set of attributes N ∈ LM
is called a model of T if ||A ⇒ B||N = 1 for each A ⇒ B ∈ T . The set of all
models of T is denoted by Mod(T ) := {N ∈ LM | N is a model of T }. The
degree ||A ⇒ B||T ∈ L to which A ⇒ B semantically follows from T is
defined by ||A ⇒ B||T := ||A ⇒ B||Mod(T ) . T is called complete in (G, M, I) if
||A ⇒ B||T = ||A ⇒ B||(G,M,I) for each A ⇒ B. If T is complete and no proper
subset of T is complete, then T is called a non-redundant basis.
Theorem 1. ([20]) T is complete iff Mod(T ) = Int(G∗ , M, I).
As in the crisp case the stem base of a given L-context can be obtained
through the pseudo-intents. P ⊆ LM is called a system of pseudo-intents if
for each P ∈ LM we have:
P ∈ P ⇐⇒ (P 6= P ↓↑ and ||Q ⇒ Q↓↑ ||P = 1 for each Q ∈ P with Q 6= P ).
Theorem 2. ([20]) T := {P ⇒ P ↓↑ | P ∈ P} is complete and non-redundant.
If (−)∗ is the globalisation, then T is unique and minimal.
3 Adding background knowledge to the stem base
The user may know some implications between attributes in advance. We will call
such kind of implications background implications. In this section we will focus
on finding a minimal list of implications, which together with the background
implications will describe the structure of the concept lattice.
The theory about background knowledge for the crisp case was developed in
[2] and a more general form of it in [10]. The results from [2] for implication
bases with background knowledge follow by some slight modifications of the
results about implication bases without background knowledge presented in [1].
The same applies for the fuzzy variant of this method. Hence, if we choose the
empty set as the background knowledge, we obtain the results from [19, 20].
We start by investigating the stem bases of L-contexts relative to a set of
background implications. Afterwards we show how some notions and results for
fuzzy implications and their stem bases change for our new setting.
The attribute sets of L-contexts and the residuated lattices L will be consid-
ered finite. Further, L is assumed to be linearly ordered.
Attribute exploration with fuzzy attributes and background knowledge 73
Definition 1. Let K be a finite L-context and let L be a set of background
attribute implications. A set B of fuzzy attribute implications of K is called L-
complete if every implication of K is entailed by L ∪ B. We call B, L-non-
redundant if no implication A ⇒ B from B is entailed by (B \ {A ⇒ B}) ∪ L.
If B is both L-complete and L-non-redundant, it is called an L-base.
Note that if we have L = ∅ in the above definition, then all L-notions are
actually the notions introduced for sets of fuzzy implications. This remark holds
also for the other notions introduced in this section.
For any set L of background attribute implications and any attribute L-set
X ∈ LM we define an L-set X L ∈ LM and an L-set X Ln ∈ LM for each
non-negative integer n by
[
X L := X ∪ {B ⊗ S(A, X)∗ | A ⇒ B ∈ L},
Ln X, n = 0,
X :=
(X Ln−1 )L , n ≥ 1.
An operator L on these sets is defined by
∞
[
L(X) := X Ln . (3)
n=0
From [20] we know that L(−) is an L∗ -closure operator for a finite set M of
attributes and a finite residuated lattice L.
Definition 2. For an L-context (G, M, I), a subset P ⊆ LM is called a system
of L-pseudo-intents of (G, M, I) if for each P ∈ LM the following holds
P ∈ P ⇐⇒ (P = L(P ) 6= P ↓↑ and ||Q ⇒ Q↓↑ ||P = 1 for each Q ∈ P : Q 6= P ).
As in the case without background knowledge, the usage of the globalisation
simplifies the definition of the system of L-pseudo-intents. We have that P ⊆ LM
is a system of pseudo-intents if
P ∈ P ⇐⇒ (P = L(P ) 6= P ↓↑ and Q↓↑ ⊆ P for each Q ∈ P with Q & P ).
Theorem 3. The set BL := {P ⇒ P ↓↑ | P is an L-pseudo-intent} is an L-base
of K. We call it the L-Duquenne-Guigues-base or the L-stem base.
Proof. First note that all implications from BL are implications of (G, M, I). We
start by showing that BL is complete, i.e., ||A ⇒ B||BL ∪L = ||A ⇒ B||(G,M,I)
for every fuzzy implication A ⇒ B. By Equation (2) follows ||A ⇒ B||(G,M,I) =
||A ⇒ B||Int(G∗ ,M,I) . Hence, it is sufficient to prove that ||A ⇒ B||BL ∪L =
||A ⇒ B||Int(G∗ ,M,I) for every fuzzy attribute implication A ⇒ B. For any L-set
N ∈ LM , N ⇒ L(N ) is entailed by L, therefore we have N = L(N ).
Each intent N ∈ Int(G∗ , M, I) is a model of BL . Now let N ∈ Mod(BL ) and
assume that N 6= N ↓↑ , i.e., N is not an intent. Since N ∈ Mod(BL ) we have
74 Cynthia Vera Glodeanu
||Q ⇒ Q↓↑ ||N = 1 for every L-pseudo-intent Q ∈ P. By definition, N is an
L-pseudo-intent and hence N ⇒ N ↓↑ belongs to BL . But now, we have
||N ⇒ N ↓↑ ||N = S(N, N )∗ → S(N ↓↑ , N ) = 1∗ → S(N ↓↑ , N ) = S(N ↓↑ , N ) 6= 1,
which is a contradiction because N does not respect this implication.
To finish the proof, we still have to show that BL is L-non-redundant. To
this end let P ⇒ P ↓↑ ∈ BL . We show that this implication is not entailed
by L := (BL \ {P ⇒ P ↓↑ }) ∪ L. As P = L(P ), it is obviously a model of
L. We have ||Q ⇒ Q||P = 1 for every L-pseudo-intent Q ∈ P different from
P since P is an L-pseudo-intent. Therefore, P ∈ Mod(L). We also have that
||P ⇒ P ↓↑ ||P = S(P ↓↑ , P ) 6= 1 and thus P is not a model of BL ∪ L. Hence, we
have ||P ⇒ P ↓↑ ||(G,M,I) = ||P ⇒ P ↓↑ ||BL ∪L 6= ||P ⇒ P ↓↑ ||L , showing that L is
not complete and thus BL ∪ L is non-redundant. t
u
In general we write P ⇒ P ↓↑ \ {m ∈ M | P (m) = P ↓↑ (m)} instead of P ⇒ P ↓↑ .
Note that computing the stem-base and closing the implications from it with
respect to the operator L(−) will yield a different set of implications than the
L-stem-base. Let us take a look at the following example.
Example 1. Consider the L-context given in Figure 1. In order to ensure that its
stem-base and L-stem-base exist, we use the globalisation. Further, we use the
Gödel logic. The stem-base is displayed in the left column of Figure 1. For the
background implications L := {b ⇒ a, d ⇒ a, {a, c} ⇒ b} we obtain the L-stem-
base displayed in the middle column of the figure. If we close the pseudo-intents
stem base L-stem base L(P ) ⇒ P ↓↑
0.5 0.5 0.5
a b c d /b ⇒ a, /b ⇒ a, /b ⇒ a,
0.5 0.5 0.5
/a ⇒ a, /a ⇒ a, /a ⇒ a,
x 1 0.5 0 0
d ⇒ a, b, c, c, 0.5/d ⇒ a, b, d, a, d ⇒ b, c,
y 1 0 0 0
c, 0.5/d ⇒ a, b, d, a, 0.5/d ⇒ b, c, d, c, 0.5/d ⇒ a, b, d,
z 0 0 1 0
b ⇒ a, c, d, a, d ⇒ b, c, a, b ⇒ c, d,
t 0 0 0 0.5
a, 0.5/d ⇒ b, c, d, a, b ⇒ c, d. a, 0.5/d ⇒ b, c, d,
a, c ⇒ b, d. a, b, c ⇒ d.
Fig. 1. An L-context and its different stem bases.
of the stem-base with respect to the operator L(−), we obtain implications of
the form L(P ) ⇒ P ↓↑ , which are displayed in the right column of the figure. As
one easily sees, the latter set of implications and the L-stem-base are different.
The set {L(P ) ⇒ P ↓↑ | P is a pseudo-intent with L(P ) 6= P ↓↑ } contains an
additional implication, namely {a, b, c} ⇒ d.
For developing our theory about fuzzy attribute exploration with background
knowledge, the following results are useful. First, the set of all intents and all
Attribute exploration with fuzzy attributes and background knowledge 75
L-pseudo-intents is an L∗ -closure system, as stated below. Due to lack of space
we omit the proofs of the following two lemmas.
Lemma 2. Let (G, M, I) be an L-context, let L be a set of fuzzy implications of
(G, M, I). Further, let P and Q be intents or L-pseudo-intents such that
S(P, Q)∗ ≤ S(P ↓↑ , P ∩ Q) and S(Q, P )∗ ≤ S(Q↓↑ , P ∩ Q).
Then, P ∩ Q is an intent.
Note that if we choose the globalisation for (−)∗ , then P ∩ Q is an intent
provided that P and Q are (L-pseudo-)intents with P * Q and Q * P .
Now we are interested in the closure of an L-set with respect to the impli-
cations of the L-base BL . Therefore, we first define for each L-set X ∈ LM and
• •
each non-negative integer n the L-sets X L , X Ln ∈ LM as follows:
• [
X L := X ∪ {B ⊗ S(A, X)∗ | A ⇒ B ∈ BL , A 6= X},
L• X, n = 0,
X :=
n • •
(X Ln−1 )L , n ≥ 1.
Further, we define an operator L• (−) on these sets by
∞
[ •
L• (X) := X Ln . (4)
n=0
Lemma 3. If (−)∗ is the globalisation, then L• given by (4) is an L∗ -closure
operator and {L• (X) | X ∈ LM } coincides with the set of all L-pseudo-intens
and intents of (G, M, I).
Remark 1. Note that for a general hedge, L• (−) does not need be an L∗ -closure
operator. For instance, choose the Goguen structure and the identity for the
hedge (−)∗ . Further, let L := {0.3/y ⇒ y}. Then,
•
L• ({0.2/y})(y) ≥ ({0.2/y})L (y) = {0.2/y} ∪ {y ⊗ (0.3 → 0.2)}
= {0.2/y} ∪ {0.(66)/y} = {0.(66)/y},
and L• ({0.3/y})(y) = {0.3/y}. Hence, L• (−) does not satisfy the monotony prop-
erty, because we have {0.2/y} ⊆ {0.3/y} but L• ({0.2/y}) * L• ({0.3/y}).
4 Attribute exploration with background knowledge
Particularly appealing is the usage of background knowledge in the exploration
process. This proves itself to be very useful and time saving for the user. He/she
will have to answer less questions, as the algorithm does not start from scratch.
Due to Remark 1 and the fact that we are only able to perform a successful
attribute exploration if the chosen hedge is the globalisation, we will consider
76 Cynthia Vera Glodeanu
only this hedge in this section. In order to arrive at the exploration with back-
ground knowledge we will present the lectic order, the “key proposition” and an
appropriate algorithm for attribute exploration in this setting.
The lectic order is defined analogously as in Section 2, see (1). The only
difference lies in the definition of “⊕”. This time we are using the L∗ -closure
•
operator (−)L instead of (−)↓↑ .
•
Theorem 4. The lectically first intent or L-pseudo-intent is ∅L . For a given
L-set A ∈ LM , the lectically next intent or L-pseudo-intent is given by the L-set
A⊕(m, l), where (m, l) ∈ M ×L is the greatest tuple such that A <(m,l) A⊕(m, l).
The lectically last intent or L-pseudo-intent is M .
Now we are prepared to present the main proposition regarding attribute
exploration with background knowledge in a fuzzy setting.
Proposition 2. Let L be a finite, linearly ordered residuated lattice with glob-
alisation. Further, let P be the unique system of L-pseudo-intents of a finite
L-context K with P1 , . . . , Pn ∈ P being the first n L-pseudo-intents in P with
respect to the lectic order. If K is extended by an object g, the object intent g ↑
of which respects the implications from L ∪ {Pi ⇒ Pi↓↑ | i ∈ {1, . . . , n}}, then
P1 , . . . , Pn remain the lectically first n L-pseudo-intents of the extended context.
Proof. Let K = (H, M, J) be the initial context and let (G, M, I) be the extended
context, namely G = H ∪ {g} and J = I ∩ (H × M ). To put it briefly, since
g I is a model of Pi ⇒ PiJJ for all i ∈ {1, . . . , n} we have that PiJJ = PiII . By
the definition of L-pseudo-intents and the fact that every L-pseudo-intent Q of
(H, M, J) with Q ⊂ Pi is lectically smaller than Pi , we have that P1 , . . . , Pn are
the lectically first n L-pseudo-intents of (G, M, I).
We now have the key to a successful attribute exploration with background
knowledge in the fuzzy setting, at least when we use the globalisation. With this
result we are able to generalise the attribute exploration algorithm as presented
by Algorithm 1. Its input is the L-context K, the residuated lattice L and the set
of background implications L. The first intent or L-pseudo-intent is the empty
set. If it is an intent, add it to the set of intents of the context. Otherwise, ask
the expert whether the implication is true in general. If so, add this implication
to the L-stem base, otherwise ask for a counterexample and add it to the context
(line 2 − 11). Until A is different from M , repeat the following steps: Search for
the largest attribute i in M with its largest value l such that A(i) < l. For this
attribute compute its closure with respect to the L• (−)-closure operator given
by (4) and check whether the result is the lectically next intent or L-pseudo-
intent (line 12 − 16). Thereby, A & i := A ∩ {1, . . . , i − 1}. In lines 17 − 25 we
repeat the same procedure as in lines 2 − 11.
The algorithm generates interactively the L-stem base of the L-context. We
enumerate the intents and pseudo-intents in the lectic order. Due to Proposi-
tion 2 we are allowed to extend the context by objects whose object intents
respect the already confirmed implications. This way, the L-pseudo-intents al-
ready contained in the stem base do not change. Hence, the algorithm is sound
and correct.
Attribute exploration with fuzzy attributes and background knowledge 77
Algorithm 1: FuzzyExploration(K, L, L)
1 L := ∅; A := ∅;
↓↑
2 if A = A then
3 add A to Int(K)
4 else
5 Ask expert whether A ⇒ A↓↑ is valid;
6 if yes then
7 add A ⇒ A↓↑ to L
8 else
9 Ask for counterexample g and add it to K
10 end
11 end
12 while A 6= M do
13 for i = n, . . . , 1 and l = max L, . . . , min L with A(i) < l do
14 B := L• (A);
15 if A & i = B & i and A(i) < B(i) then
16 A := B;
17 if A = A↓↑ then
18 add A to Int(K)
19 else
20 Ask expert whether A ⇒ A↓↑ is valid;
21 if yes then
22 add A ⇒ A↓↑ to L
23 else
24 Ask for counterexample g and add it to K
25 end
26 end
27 end
28 end
29 end
5 Illustrative example
For our illustrative example we will consider the data from Figure 2. The ob-
jects are different universities from Germany and the attributes are indicators
rating these institutions. Study situation overall: M.Sc. students were asked
about their overall rating of their studies. IT-infrastructure: the availability of
subject-specific software, PC pools and wifi were taken into account. Courses
offered: amount of courses and the interdisciplinary references were relevant.
Possibility of studying: timing of the courses and content of the curriculum
were decisive. Passage to M.Sc.: clearly formulated admission requirements
and assistance of the students with the organisational issues were relevant.
Suppose we want to explore the implications between the attributes from
the L-context from Figure 2. We also know some examples, namely the TUs.
These will be the objects of the L-context we start with. Further, we heard
78 Cynthia Vera Glodeanu
from others that the implications {a, b} ⇒ c, d ⇒ {0.5/a, e}, {a, e} ⇒ {c, d} and
a ⇒ {0.5/b, 0.5/c, 0.5/e} hold. These will be considered the set of background im-
plications L. The exploration process is displayed in the left column of Figure 3.
The first L-pseudo-intent is ∅ and we ask the expert whether ∅ ⇒ ∅↓↑ holds.
This is not the case and a counterexample is Uni Bochum. For implications that
hold, for instance in step no. 3, the expert answers just “yes” and the implication
is added to the L-base. Afterwards, the validity of the implication induced by
the next L-pseudo-intent is asked, and so on. The algorithm continues until we
reach M as an intent or L-pseudo-intent. In our case, however, the algorithm
stops at step no. 10. This is due to the fact that the implications induced by the
L-pseudo-intents after {b, 0.5/d} are confirmed by the implications from the back-
ground knowledge. The result of the exploration is an extended context, namely
study situation IT- infra- courses possibility of passage to
overall structure offered studying M.Sc.
a b c d e
TU Braunschweig 0.5 0 0.5 0.5 0
TU Chemnitz 0.5 1 0.5 0.5 0.5
TU Clausthal 1 1 1 1 1
TU Darmstadt 0.5 0.5 0.5 0.5 0.5
TU Ilmenau 0.5 1 0.5 0.5 1
TU Kaiserslautern 1 0.5 0.5 0.5 0
Uni Bielefeld 0.5 0 0.5 1 1
Uni Bochum 0 0.5 0.5 0.5 1
Uni Duisburg 0.5 0.5 0 0.5 0.5
Uni Erlangen 0.5 0.5 0.5 0.5 0
Uni Heidelberg 0.5 1 0.5 1 1
Uni Koblenz 0.5 0.5 0.5 0.5 0.5
Uni Saarbrücken 1 0.5 1 1 1
Fig. 2. The data is an extract from the data published in the journal Zeit Campus in
January 2013. The whole data can be found under https://bit.ly/ZCinsr-informatik.
that contains our initial examples and the counterexamples we (or the expert)
has entered. We also obtain an L-base consisting of the background implica-
tions L and the implications we have confirmed during the exploration process.
In the right column of Figure 3 the exploration without background knowledge
is displayed. One immediately sees that there are 4 additional steps. The first
difference between the explorations appears in step no. 8. Without using back-
ground knowledge we have to answer the implication from the right column,
while this implication is already confirmed if we use background knowledge. The
exploration without background knowledge yields the same extended context
whereas the stem base contains the implications we have confirmed during the
process.
Attribute exploration with fuzzy attributes and background knowledge 79
no. expl. w. background know. simple expl.
0.5 0.5 0.5
1 Q: {} ⇒ { /a, /c, /d} Q: {} ⇒ {0.5/a, 0.5/c, 0.5/d}
E: no, ex. Uni Bochum E: no, ex. Uni Bochum
2 Q: {} ⇒ {0.5/c, 0.5/d} Q: {} ⇒ {0.5/c, 0.5/d}
E: no, ex. Uni Duisburg E: no, ex. Uni Duisburg
3 Q: {} ⇒ 0.5/d Q: {} ⇒ 0.5/d
E: yes E: yes
0.5 0.5 0.5
4 Q: { /d, /e} ⇒ /b Q: {0.5/d, 0.5/e} ⇒ 0.5/b
E: no, ex. Uni Bielefeld E: no, ex. Uni Bielefeld
5 Q: {0.5/b, 0.5/d} ⇒ 0.5/e Q: {0.5/b, 0.5/d} ⇒ 0.5/e
E: no, ex. Uni Erlangen E: no, ex. Uni Erlangen
0.5 0.5
6 Q: { /d, e} ⇒ /c Q: {0.5/d, e} ⇒ 0.5/c
E: yes E: yes
7 Q: {0.5/a, 0.5/b, 0.5/c, 0.5/d, e} ⇒ b Q: {0.5/a, 0.5/b, 0.5/c, 0.5/d, e} ⇒ b
E: no, ex. Uni Saarbrücken E: no, ex. Uni Saarbrücken
8 Q: {0.5/a, 0.5/b, 0.5/c, d, e} ⇒ {a, c} Q: d ⇒ {0.5/a, 0.5/c, e}
E: no, ex. Uni Heidelberg E: yes
0.5 0.5 0.5
9 Q: {c, /d} ⇒ {a, /b, d, /e} Q: {0.5/a, 0.5/b, 0.5/c, d, e} ⇒ {a, c}
E: yes E: no, ex. Uni Heidelberg
10 Q: {b, 0.5/d} ⇒ {0.5/a, 0.5/c} Q: {c, 0.5/d} ⇒ {a, 0.5/b, d, 0.5/e}
E: yes E: yes
exploration stopped.
11 Q: {b, 0.5/d} ⇒ {0.5/a, 0.5/c, 0.5/e}
E: yes
12 Q: {a, 0.5/d} ⇒ {0.5/b, 0.5/c, 0.5/e}
E: yes
13 Q: {a, 0.5/b, 0.5/c, 0.5/d, e} ⇒ {c, d}
E: yes
14 Q: {a, b0.5/c, 0.5/d, 0.5/e} ⇒ {c, d, e}
E: yes
exploration stopped.
Fig. 3. Exploration with and without background knowledge.
References
1. Ganter, B., Wille, R.: Formale Begriffsanalyse: Mathematische Grundlagen.
Springer, Berlin, Heidelberg (1996)
2. Stumme, G.: Attribute exploration with background implications and exceptions.
In Bock, H.H., Polasek, W., eds.: Data Analysis and Information Systems. Sta-
tistical and Conceptual approaches. Proc. GfKl’95. Studies in Classification, Data
Analysis, and Knowledge Organization 7, Heidelberg, Springer (1996) 457–469
80 Cynthia Vera Glodeanu
3. Glodeanu, C.: Attribute exploration in a fuzzy setting. In Domenach, F., Igna-
tov, D., Poelmans, J., eds.: Contributions to International Conference on Formal
Concept Analysis, Katholieke Universiteit Leuven (2012)
4. Glodeanu, C.: Conceptual Factors and Fuzzy Data. PhD thesis, TU Dresden
(2012)
5. Sacarea, C.: Towards a theory of contextual topology. PhD thesis, TH Darmstadt,
Aachen (2001)
6. Kwuida, L., Pech, C., Reppe, H.: Generalizations of Boolean algebras. an attribute
exploration. Math. Slovaca 56(2) (2006) 145–165
7. Revenko, A., Kuznetsov, S.: Attribute exploration of properties of functions on
ordered sets. In: Proc. CLA 2010. (2010) 313–324
8. Bartel, H.G., Nofz, M.: Exploration of nmr data of glasses by means of formal
concept analysis. Chemom. Intell. Lab. Syst. 36 (1997) 53–63
9. Stumme, G.: Acquiring expert knowledge for the design of conceptual information
systems. In Fensel, D., Studer, R., eds.: EKAW. Volume 1621 of Lecture Notes in
Computer Science., Springer (1999) 275–290
10. Ganter, B.: Attribute exploration with background knowledge. Theoretical Com-
puter Science 217(2) (1999) 215–233
11. Hájek, P.: The Metamathematics of Fuzzy Logic. Kluwer (1998)
12. Klir, G., Yuan, B.: Fuzzy sets and fuzzy logic - theory and applications. Prentice
Hall P T R, Upper Saddle River, New Jersey 07458 (1995)
13. Belohlávek, R., Vychodil, V.: Fuzzy concept lattices constrained by hedges. JACIII
11(6) (2007) 536–545
14. Umbreit, S.: Formale Begriffsanalyse mit unscharfen Begriffen. PhD thesis, Martin-
Luther-Universitaet Halle-Wittenberg (1994)
15. Burusco, A., Fuentes-Gonzales: The study of L-Fuzzy Concept Lattice. Mathware
and soft computing 1(3) (1994) 209–218
16. Pollandt, S.: Fuzzy Begriffe. Springer Verlag, Berlin Heidelberg New York (1997)
17. Bělohlávek, R.: Fuzzy Relational Systems: Foundations and Principles. Systems
Science and Engineering. Kluwer Academic/Plenum Press (2002)
18. Bělohlávek, R.: Algorithms for fuzzy concept lattices. In: International Conference
on Recent Advances in Soft Computing. (2002) 200–205
19. Bělohlávek, R., Vychodil, V.: Attribute implications in a fuzzy setting. In Missaoui,
R., Schmid, J., eds.: International Conference on Formal Concept Analysis. Lecture
Notes in Computer Science, Springer (2006) 45–60
20. Bělohlávek, R., Vychodil, V.: Fuzzy attribute logic: attribute implications, their
validity, entailment, and non-redundant basis. In Liu, Y., Chen, G., Ying, M., eds.:
Eleventh International Fuzzy Systems Association World Congress,. Volume 1 of
Fuzzy Logic, Soft Computing & Computational Intelligence., Tsinghua University
Press and Springer (2005) 622–627