<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Conceptual Methods for Identifying Needs of Mobile Network Subscribers</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dmitry Palchunov</string-name>
          <email>palch@math.nsc.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gulnara Yakhyaeva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ekaterina Dolgusheva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Novosibirsk State University</institution>
          ,
          <addr-line>Novosibirsk, Russian Federation</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Sobolev Institute of Mathematics</institution>
          ,
          <addr-line>Novosibirsk, Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>The paper is devoted to methods for identifying payment plans and services by mobile operators which are the best for the given subscribers. We base our research on the model-theoretic approach to domain formalization. We use Formal Concept Analysis for processing the mobile subscriber data. An Ontological Model of the domain “Mobile Networks” is constructed in the scope of this research. The Ontological Model of the domain is constructed by integration of data extracted from depersonalized subscriber profiles. The signature of this Ontological Model contains unary predicates which describe subscriber behavior and features of payment plans and services. We consider formal contexts where objects are subscriber models and attributes are formulas of predicate logic. We investigate concept lattices and association rules of these formal contexts. Knowledge about optimal payment plans and services for a given subscriber is generated automatically with the help of the association rules.</p>
      </abstract>
      <kwd-group>
        <kwd>mobile networks</kwd>
        <kwd>mobile network subscribers</kwd>
        <kwd>formal context</kwd>
        <kwd>concept lattice of formal context</kwd>
        <kwd>association rules</kwd>
        <kwd>ontology</kwd>
        <kwd>ontological model</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Mobile connection is a very important part of our life. Mobile operators provide the
possibility to be in touch for people in different countries. Operators provide access to
USSD-applications and to the Internet.</p>
      <p>Mobile operators develop various payment plans and services to satisfy their
clients' needs. However it is difficult for mobile network subscribers to get up-to-date
information about new payment plans or services. Mobile operators send SMS
messages to inform clients about news. But it is very expensive to inform all subscribers
about every small change or update of services. A possible solution of this problem is
sending personal recommendations about services and payment plans that could be
useful for a given subscriber.</p>
      <p>
        A visualization approach based on a graph of calls made by subscribers was used
in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] for mining behavior patterns of mobile network subscribers. A behavior pattern
discovered during the graph exploration resulted in developing and applying a new
payment plan. Development of methods for increasing the number of subscribers
using services by a mobile network is studied in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. An algorithm called Frequent
Pattern-Growth Strategy is used for mining patterns in how subscribers use mobile
network services. Optimization strategies are suggested by experts based on series of
‘frequent’ sets.
      </p>
      <p>
        Formal Concept Analysis is a well-known formalism in data analysis and
knowledge engineering, see recent surveys [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. Formal Concept Analysis is used to
develop user behavior templates [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. These results are applied to planning and
running marketing campaigns.
      </p>
      <p>
        Association rules for optimizing structures of menus for accessing mobile network
services were constructed in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The Apriori algorithm was used in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] to develop
association rules patterns in services visited during a single subscriber session. Today
we have more effective algorithms for mining association rules, e.g. see [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Fuzzy concept lattices were first introduced in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Papers [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11-13</xref>
        ] are devoted to
definitions of fuzzy transaction, support and confidence of fuzzy association rules.
The authors of [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] used an algorithm developed in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] for building sets of fuzzy
rules which describe dependencies between popular telecom services provided by
mobile networks in Taiwan.
      </p>
      <p>Our research is devoted to methods for identifying payment plans and services
which would be optimal for a given mobile network subscriber. Such knowledge
allows mobile operator to make really useful recommendations for subscribers.</p>
      <p>
        We base our research on the model-theoretic approach to domain formalization
[
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18">15-18</xref>
        ]. We use methods and techniques of Formal Concept Analysis for processing
the mobile subscriber data. Now a lot of attention is paid to the relationships between
FCA and models of knowledge representation and processing [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>The ontological model of the domain “Mobile Networks” is constructed by
integration of data extracted from depersonalized subscriber profiles. The signature of this
ontological model contains unary predicates which describe subscriber behavior and
features of payment plans and services. To generate meaningful recommendation of
alternative services and payment plans, we define formal contexts where objects are
subscriber models, and attributes are formulas of predicate logic. We investigate
concept lattices and association rules of these formal contexts to get high-quality
recommendation. To do this, we consider extensions of attribute sets of formal contexts.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] extensions of infinite attribute sets were considered, it was suggested to use
concept descriptions of bounded depth. In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] a new approach to reduce the number
of attributes was presented.
      </p>
      <p>
        In this paper we consider finite extensions of the initial finite context. We use
interrelation between axiomatizable classes and FCA [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Section 2.1 is devoted to
isomorphisms between lattices of relatively axiomatizable classes of one-element
models and lattices of formal concepts of formal contexts generated by these classes.
Section 2.2 describes extensions of such formal contexts having distributive concept
lattices.
      </p>
      <p>The main purpose of this paper is to develop methods of identifying payment plans
and services which would be optimal for the given mobile network subscriber. To do
this, firstly, we construct Case Model based on the known information about behavior
patterns of mobile network subscribers (Section 2.2). We represent the Case Model as
a relatively axiomatizable class of one-element models. On the base of this Case
Model we define a formal context.</p>
      <p>Secondly, we move from the Case Model to Ontology Model (Section 3.1). We
construct the set of ontological projections which is the basis of extensions of attribute
set of the formal context under consideration (Section 3.2).</p>
      <p>And finally we mine association rules with high confidence and support in the
extended formal context. Computer experiments show that the methods presented in the
paper allow us to find association rules which can be used for recommendations.
2
2.1</p>
      <p>Case Model</p>
      <p>
        Relatively axiomatizable classes and formal contexts
Here we introduce some definitions and results on the relationship between relatively
axiomatizable classes and formal contexts. The main result of this section is
Proposition 2 which is necessary for proofs of Propositions 4 and 5 in Section 2.2. The proofs
of the statements are based on [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>An algebraic system (a model) is a tuple  = ; !, . . . , !, !, . . . , !, !, . . . , ! ,
where the set  =  is called universe, !, . . . , ! are predicates defined on the set
, !, . . . , ! are functions defined on the set  and !, . . . , ! are constants. The tuple
 = !, . . . , !, !, . . . , !, !, . . . , ! is called signature of the algebraic system .</p>
      <p>Denote by () the set of all free variables of a formula . A formula having no
free variables is called sentence. For a signature  we denote:
() ⇋ { |      ℎ  },
!  ⇋   ∈      = {}},
() ⇋ { |      ℎ  } and
() ⇋ { |      ℎ  }.</p>
      <p>Here   = {} means that each formula  ∈ !  has just one free variable,
which is the fixed variable .</p>
      <p>Consider a signature  and a model  ∈ (). For a sentence  ∈ () we denote
 ⊨  if  is true in the model . For a formula (!, … , !) ∈ () we write
 ⊨  if  ⊨ ∀! … ∀!(!, … , !).</p>
      <p>Definition 1. Let  ⊆ (). For a formula  ∈ () we denote  ⊨  if  ⊨ 
for any  ∈ . For a set of formulas  ⊆ () we denote  ⊨  if  ⊨  for any
 ∈  and  ∈ . For a set of formulas  ⊆ () we denote</p>
      <p>⇋ !  ⇋  ∈    ⊨     ∈  }.</p>
      <p>A class  ⊆   is called axiomatizable if there exists a set  ⊆ () such that
 = {  ∈ () |  ⊨ }.</p>
      <p>
        For the aims of our research we need to generalize the notion of relatively
axiomatizable class [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] to the case of arbitrary sets of formulas .
      </p>
      <p>Definition 2. Let , ! ⊆   and  ⊆ (). We say that the class ! is
axiomatizable in the class  relatively to the set of formulas  if there exists a set  ⊆ 
such that ! = { ∈  |  ⊨ }.</p>
      <p>Notice that the class ! ⊆   is axiomatizable if and only if ! is axiomatizable
in the class  =   relatively to the set of formulas  = ().</p>
      <p>Definition 3. For  ⊆ () and  ⊆ () we denote
 ,  ⇋ ! !       ℎ    }
and !() ⇋ { ∈  |  ⊨ }. The set of formulas !() is call -type of .</p>
      <p>Note that ! ∈ (, ) if and only if ! = { ∈ |  ⊨ !(!)}.</p>
      <p>
        For each class  ⊆ () and set  ⊆ () we consider the formal context
(, , ⊨), with derivation operator ()′ [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>Remark 1. Let  ⊆ (),  ⊆ () and  ⊆ . Then ′ = !().</p>
      <p>For a formal context
cepts of the formal context</p>
      <p>we denote the lattice of formal
con</p>
      <p>Proposition 1. Let  ⊆ () ,  ⊆ () ,  ⊆  and  ⊆  . Then ,  ∈
 , , ⊨ if and only if  is axiomatizable in the class  relatively to the set of
formulas  and  = !().</p>
      <p>Proof. (⇒) Let ,  ∈  , , ⊨ . Then  = ′, so  = !() by Remark 1.
We have  = ′, hence  = { ∈  |  ⊨ } and  ⊆ . Therefore, by Definition 2,
the class  is axiomatizable in the class  relatively to the set of formulas .</p>
      <p>(⇐) Let the class  be axiomatizable in the class  relatively to the set of
formulas  and  ⊆ . So there exists  ⊆  such that  = { ∈  |  ⊨ }. Then in the
formal context (, , ⊨) we have ′ =  . So ′′ =  . The set  = !() , thus
 = ′ by Remark 1. Therefore, ,  ∈  , , ⊨ .</p>
      <p>Corollary 1. Let , ! ⊆   and  ⊆ ().
1. ! ∈ (, ) if and only if !, !(!) ∈  , , ⊨ .</p>
      <p>2. ! = !′′ if and only if ! is axiomatizable in the class  relatively to the set
of formulas .</p>
      <p>Therefore, the classes which are axiomatizable in a class  relatively to a set of
formulas Δ are exactly extents of the formal concepts of the formal context (, , ⊨).</p>
      <p>We consider (, ) as a set ordered by inclusion ⊆. So (, ) is a lattice.</p>
      <p>Proposition 2. The lattices (, , ⊨) and (, ) are isomorphic, i.e.,
(, , ⊨) ≅ (, ), for any  ⊆ () and  ⊆ ().</p>
      <p>Proof. Let us consider the mapping ℎ: (, , ⊨) → (, ) defined as follows:
ℎ ,  =  for any ,  ∈ (, , ⊨) . By Proposition 1 for any ,  ∈
(, , ⊨) we have ℎ ,  =  ∈ (, ) . For each  ∈ (, ) it is true that
, !() ∈ (, , ⊨), so ℎ , !() = . Thus the mapping ℎ is onto.</p>
      <p>For any !, ! , !, ! ∈ (, , ⊨) we have:
! ⊆ !. Hence the mapping ℎ preserves the partial order.</p>
    </sec>
    <sec id="sec-2">
      <title>Therefore, the mapping ℎ is an isomorphism.</title>
      <p>!, !
≤ !, !
iff
2.2</p>
      <p>Description of the Case Model
Further we consider signatures consisting of a finite set of unary predicate symbols,
i.e.  =&lt; !, … , ! &gt;. We consider the set  ⊆ () for different signatures  which
means that the original signature is enriched by new unary predicate symbols. From a
model-theoretic point of view we may assume that there is some covering signature
! and all considered signatures are its subsets.</p>
      <p>Consider a finite set  = !, … , ! of subscribers of a given mobile network and
fix a signature  = ℙ ∪ ℚ where ℙ is a set of personal characteristics of
subscribers and ℚ is a set of payments plans, services and options. Each of these sets has a
hierarchical structure. There are more details about the signatures ℙ and ℚ below.
For each subscriber ! we know which characteristics (presented by signature
predicates from ) are true and which characteristics are false. Thus, for each subscriber !
there is a one-element model  = ! ,  which is called a case of the domain .</p>
      <p>
        Consider the Case Model  = ,  defined by a set of cases , … ,  [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
On the model  for each signature predicate  ∈  and for every element  ∈  we
have  ⊨   if and only if the predicate   is true in the model (case)  (i.e.,
 ⊨   ). Here  ⊨   means that ⊨   . On the base of the Case Model
 = ,  in the section 3.5 we will define the ontological model.
      </p>
      <p>Denote by  = , … ,  the class of cases (one-element models) generated by
the set of subscribers !, … , ! .</p>
      <p>Note that  =  ;  |  ∈    ;  ≤  . Here the notation  =
 ;  ≤  means that the model  is a submodel of the model . Recall that in
pure predicate signature each subset of a model is the universe of its submodel.</p>
      <p>Here we consider different sets of formulas Δ ⊆ !(). In particular, we consider
Δ! =   |  ∈  ⊆ !(). Denote by ! = , ∆, ⊨ the formal context having
the set of objects , the set of attributes Δ and the incidence relation ⊨. Denote
! = , ∆!, ⊨ .</p>
      <p>
        ∆⊆ !() is a set of properties of the cases  ∈ , which are definable by
formulas of the signature . When we change the set ∆ we change the set of attributes of the
formal context keeping fixed the set of objects . Reductions and expansions of
formal contexts were studied in [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>Let us consider two formal contexts ! = , !,  and ! = , !,  . Suppose
that ! ⊆ !,  ⊆  and  = ′′ в !. Then  = ′′ in !.</p>
      <p>We define a mapping : (, !, ) → (, !, ) as follows:  , ! = (, !),
where  ⊆ , ! ⊆ !, ! ⊆ !,  = ′′, ! = ′ in the context ! and ! = ′ in
the context !.</p>
      <p>Remark 2. The mapping : (, !, ) → (, !, ) is an isomorphic embedding
of the lattice (, !, ) into the lattice (, !, ).</p>
      <p>Next consider an arbitrary signature ! and an arbitrary class ! ⊆ (!).</p>
      <p>Remark 3. Let ∆⊆ (!) and !, … , ! ∈ (!). Then the mapping
: (!, ∆, ⊨) → (!, ∆ ∪ !&amp; … &amp;! , ⊨) is an isomorphism of lattices.</p>
      <p>Corollary 2. а) The sets of association rules of the formal contexts (!, ∆, ⊨) and
(!, ∆ ∪ !&amp; … &amp;! , ⊨) coincide up to the substitution of the formula
!&amp; … &amp;! by the set !, … , ! .</p>
      <p>b) The sets of attribute implications of the formal contexts (!, ∆, ⊨) и (!, ∆ ∪
!&amp; … &amp;! , ⊨) coincide up to the substitution of the formula !&amp; … &amp;! by the
set !, … , ! .</p>
      <p>Corollary 3. If ∆, ∆!⊆ (!), ∆⊆ ∆! and the set ∆!\∆ consists of some
conjunctions of formulas from ∆ then the sets of attribute implications as well as the sets of
association rules of the formal contexts (!, ∆, ⊨) and (!, ∆!, ⊨) coincide up to the
substitution of the conjunctions from ∆!\∆ by the corresponding sets of formulas.</p>
    </sec>
    <sec id="sec-3">
      <title>Let us go back to the formal context (, ∆!, ⊨).</title>
      <p>Remark 4. Let !, ! ∈  . Then the mapping
: (, ∆!, ⊨) → (, ∆! ∪ !() ∨ !() , ⊨) is an isomorphic embedding of
lattices; in the general case this mapping is not an isomorphism. Moreover, in the
general case (, ∆!, ⊨) ≇  , ∆! ∪ !() ∨ !() , ⊨ .</p>
      <p>Corollary 4. In the general case if we add a disjunction !  ∨ … ∨ !() to
the set of formulas ∆!, where !, … , ! ∈ , then the set of association rules of the
formal context (, ∆!, ⊨) will be changed.</p>
      <p>Denote ∆∨!= ∆! ∪ !  ∨ … ∨ !() , | ! ∈  .</p>
      <p>We will be adding disjunctions of signature predicates into the set ∆! for
improving association rules based on an algorithm for subscribers’ behavior prediction. It
means that we will consider the set of formulas ∆!
∨ instead of the set of formulas ∆!
and the formal context (, ∆!, ⊨) instead of the formal context (, ∆!, ⊨).</p>
      <p>∨</p>
      <p>Definition 4. We say that a set of formulas  ⊆ (!) is closed under disjunction
if ( ∨ ) ∈  for any ,  ∈ .</p>
      <p>Proposition 3. Let  ⊆  and ∆⊆ (). If the set of formulas ∆ is closed under
disjunction then the lattice (, ∆) is distributive.</p>
      <p>Proof. Assume that ∆⊆ () and !, ! ∈ (, ∆). Then !, ! ⊆  and there
exist Γ!, Γ! ∈ ∆ such that ! =  ∈  |  ⊨ Γ! and ! =  ∈  |  ⊨ Γ! .</p>
      <p>Denote Γ! = Γ! ∪ Γ! and Γ! =  ∨ ) |  ∈ Γ!   ∈ Γ! . Then ! ∩ ! =
 ∈  |  ⊨ Γ! , hence ! ∩ ! ∈ (, ∆).</p>
      <p>Let  ∈ . Then  is a one-element model. Therefore for any  ∈ Γ! and  ∈ Γ!
we have:  ⊨  ∨  ⇔  ⊨ ∀! … ∀! (!, … , ! ∨ (!, … , !)) ⇔
⇔  ⊨ ∀! … ∀! !, … , !   ⊨ ∀! … ∀! !, … , ! ⇔
⇔  ⊨    ⊨ , where   ∨  = !, … , ! .</p>
      <p>Assume that  ∈ ! ∪ ! , then  ∈ !   ∈ ! ⇒</p>
      <p>⇒  ∈    ⊨ Γ!   ∈    ⊨ Γ! ⇒
⇒  ∈    ⊨ Γ!   ⊨ Γ! ⇒  ∈    ⊨ Γ!.</p>
      <p>Next, suppose that  ⊭ Γ! and  ⊭ Γ!. So there exist  ∈ Γ! and  ∈ Γ! such that
 ⊭  and  ⊭ . Then  ⊭  ∨  , so  ⊭ Γ!.</p>
      <p>Thus, if  ⊨ Γ! then  ⊨ Γ!   ⊨ Γ! . Hence, if  ∈  and  ⊨ Γ! then
 ∈ ! or  ∈ !, so  ∈ ! ∪ ! .</p>
      <p>Therefore, ! ∪ ! =  ∈  |  ⊨ Γ! and ! ∪ ! ∈ (, ∆).</p>
      <p>We proved that ! ∩ ! , ! ∪ ! ∈ (, ∆) for any !, ! ∈ (, ∆). Hence,
the lattice (, ∆) is distributive.</p>
      <p>Proposition 4. The lattice of formal concepts (, ∆∨!, ⊨) is distributive.
Proof: in virtue of Proposition 2 and Proposition 3.</p>
      <p>However the initial formal context (, ∆!, ⊨) does not have this good property.</p>
      <p>Remark 5. In the general case the lattice of formal concepts (, ∆!, ⊨) is not
distributive. It means that there exists a class  such that the lattice (, ∆!, ⊨) is
not distributive.</p>
      <p>Remark 6. Let ∆ ⊆ !  , ∆!⊆ ∆ and the set ∆\∆! consists of some conjunctions
of formulas from ∆!. Then there exists a class  such that the lattice (, ∆, ⊨) is
not distributive.</p>
      <p>For the set of all formulas the situation is better.</p>
      <p>Proposition 5. 1) The lattice of formal concepts (, !  , ⊨) is distributive.
2) The lattice of formal concepts (,   , ⊨) is distributive.</p>
      <p>Proof: in virtue of Proposition 2 and Proposition 3.</p>
      <p>Association rule mining for the original context , ∆!, ⊨ does not produce a lot
of rules with high confidence. A lot of various payment plans and services exist, and
commonly more than one service can be useful for the subscriber. The service that
will be preferred by the user depends on many factors. Some of these factors can
change time to time. So we cannot detect such factors in scope of formal context
, ∆!, ⊨ because the context is based on long users’ history.</p>
      <p>Moreover, mobile operator can suggest 2-3 possible services and the subscriber
may select himself the most useful service. That is why it makes sense to add
disjunctions of signature predicates to ∆! and use context , ∆∨!, ⊨ on next steps.</p>
      <p>There are two problems with association rules that were mined using formal
context (, ∆∨!, ⊨). First of all some of rules have high confidence, but their conclusions
are disjunctions of meaningfully nonrelated services. Such association rules could not
be used for recommendations. It will be looking like spam for mobile network
subscribers. So experts should process all rules and select only meaningful rules. Second,
processing the whole formal context (, ∆∨!, ⊨) is very laborious computational
procedure.</p>
      <p>To solve these problems we are moving from the Case Model  = ,  to the
Ontological Model , !, !, ! of the domain. We add new unary predicates to the
signature  to describe meaning of payment plans and services. Using new predicates
(from the signature ℝ) we generate automatically meaningful disjunctions of original
predicates from the signature .</p>
      <p>Ontological Model of the domain</p>
      <p>
        Ontology
Ontological Model of the domain consists of four parts [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]:
      </p>
      <p>(1) The domain ontology, i.e. description of the structure and the meaning of the
domain concepts.</p>
      <p>(2) General knowledge and domain regularities, sentences which are true for every
case.</p>
      <p>(3) The set of cases from the domain, that we consider in the given moment. This
is empirical knowledge about the domain; the set of cases that we are looking at in
this article is represented by the model  = ,  .</p>
      <p>
        (4) Estimated and probabilistic knowledge: probabilistic and confidential
estimates, fuzzy values of sentences [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>In this section we describe construction of the domain ontology.</p>
      <p>
        From a model-theoretic point of view the domain ontology construction consists
of description of the signature and creation of a set of axioms that describe the
meaning of the concepts of the domain [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ]. To define the signature  of the domain
 = “Mobile networks” we consider two sets of attributes: ℙ, the set of individual
subscriber’s features and ℚ, the set of various payment plans and services.
      </p>
      <p>The set of attributes ℙ, “Individual subscribers’ feature” consists of two parts:
ℙ!, “payment plans” and ℙ!, “accrual”. Every part ℙ! ( = 1, 2) consists of two
subparts, such as ℙ!!, “traffic (and accrual) without roaming inside operator
network”,…, !!", “traffic (and accrual) in common roaming”, … . Each of the listed
signatures consists of more detailed categories, e.g., !!!!, “Traffic SMS without
roaming inside operator network”. Every category !!"# contains finite number of
signature symbols !!!", … . , !!!" . For example, !!!!  = “Traffic of SMS without
roaming inside network for subscriber  is not more than 50 SMS in month” and
!!!"  = “Traffic of SMS without roaming inside network for subscriber  is more
than 50 SMS in month”.</p>
      <p>Signature ℚ consists of two parts: ℚ!and ℚ!. Part ℚ!is “payment plans”, it has
hierarchical structure and consists of symbols of unary predicates. Each unary
predicate describes the presence or absence of connected payment plan for subscribers.
Signature ℚ!, “services and options”, consists of symbols of unary predicates. Each
unary predicate describes the presence or absence of connected service or option.</p>
      <p>To describe the domain ontology, we define a finite set of ontological axioms
! ⊆ !(ℙ ∪ ℚ). We introduce the following axioms.</p>
      <p>Axioms of hyponym-hyperonym. Hierarchical structure of the signature ℚ! is
represented by axioms such as:</p>
      <p>(!!"#  → !!"  )  (!!"() → !()).</p>
      <p>Axioms of completeness. For each predicates inside every class ℙ!"# and class
ℚ! for a given subscriber there must be at least one true predicate. The schemes of
such axioms are the following:</p>
      <p>∨   | () ∈ ℙ!"#  ∨   | () ∈ ℚ! .</p>
      <p>Axioms of including. For example, if payment plan  contains “more than 100 free
SMS” then it contains “more 50 free SMS”. The schemes of such axioms are the
following:</p>
      <p>(!!"!#  → !!"!#  ), where ! &lt; !.</p>
      <p>Next we construct an extension ℙ ∪ ℚ of the signature  by additional unary
predicates that describe properties of payment plans and interests of subscribers. For
that we introduce two types of concepts:</p>
      <p>1) Concepts ℝ. This is a set of features for different payment plans, services, and
options. For example, amount of free calls time, volume of SMS package or of
Internet package and etc. With the help of ℝ we can give formal definition for payment
plans and services, i.e., formal definition of predicates of the signature ℚ.</p>
      <p>2) Concepts  describing subscriber’s interests, e.g., reducing the costs of calls,
SMS, etc.</p>
      <p>
        Concepts from ℝ ∪  are used for automation of construction formulas as
attributes in formal contexts for association rules mining. Notice that the pair , 
forms the ontology of the domain  [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>In the next step we introduce a new set of axioms ! ⊆ !() and call it the
domain axioms. This set will be used for describing various characteristics of
payment plans and services provided at present moment of time by a mobile network.</p>
      <p>Among other things, these axioms relate personal parameters of a subscriber. The
range of parameters contains subscriber traffics denoted by predicates from ℙ! and
payments denoted by predicates from ℙ!, with regard to activated payment plans
from ℚ!and services from ℚ!.</p>
      <p>Axioms ! are true for any case from the domain, and the same statement is true
for ontological axioms as well. However, there is a difference between ontological
and domain axioms, as the second ones might change over time. Consider the
following formula as an example of a domain axiom:</p>
      <p>(!  → ¬!  ), ℎ ! ∈ ℚ!, ! ∈ ℚ!.</p>
      <p>This formula declares the following: if a subscriber has payment plan !
activated, then service ! cannot be activated for this subscriber. Note that a mobile network
company can naturally change its decision for not supporting simultaneously the
precise payment plan along with the specific service, at any moment.
3.2</p>
      <p>Ontological projections
In order to automate development of the formula set Δ for the sake of finding
association rules, we use the Ontological Model of the domain.</p>
      <p>Definition 4. An Ontological Model of a domain is a tuple , !,  !, ! , where
! is an analytical theory of the domain,  ! is a theory of the domain, and ! is a
fuzzy theory of the model .</p>
      <p>The analytical theory ! of the domain under consideration is axiomatized by the
sentences ! which are axioms of the domain ontology. A theory  ! of the domain
is axiomatized by the axioms ! of the domain.</p>
      <p>Formula definitions of predicates from ℚ (which present payment plans and
services) are defined by construction of ontological projection.</p>
      <p>Definition 5. Consider the Ontological Model , !,  !, ! , let  ∈ ℚ. Denote
! =  ∈ ! ℝ | ! ⊢   →   .</p>
      <p>An ontological projection of the predicate  on the signature ℝ is the formula
!!ℝ  = &amp;   |  ∈ ℝ  () ∈ ! .</p>
      <p>A projection of the predicate  on the set of formulas ! ℝ is the formula
!!ℝ  = &amp;! = &amp;   | () ∈ ! .</p>
      <p>Let us consider the formal context ! = , ∆, ⊨ . We search association rules
with the following requirements:
1) а) the premise of the association rule is included in the set ∆↾ℙ or
b) the premise of the association rule is included in the set ∆↾ ℙ ∪ ℚ ;
2) a) the conclusion of the association rule belongs to the set ∆↾ ℚ or
b) the conclusion of the association rule belongs to the set ∆↾ ℝ or
c) the conclusion of the association rule belongs to the set ∆↾ ℝ ∪  ;
3) the support and the confidence of the rules are higher than specified limits.</p>
      <p>
        Notice that the set of association rules of the formal context ! = , ∆, ⊨ is
included in the fuzzy theory ! of the model  [
        <xref ref-type="bibr" rid="ref26 ref27">26, 27</xref>
        ].
      </p>
      <p>Then the software system automatically processes obtained association rules. For
example, consider an association rule with one-element conclusion  belonging to ℝ.
This rule will be transformed into association rule with the same premise, but the
conclusion of the new rule will be one-variable formula from Δ which is a disjunction
of all predicates ! ∈ ℚ such that P belongs to the ontological projection of !.
4</p>
      <p>Software Implementation
Using the results of the presented investigation, we have developed a software for
mining association rules in the formal context (, ∆∨!, ⊨). We have found out that
adding predicates from ℝ to the formal context gives us the possibility to find
association rules with high confidence and support. Conclusions of such rules are
transformed into disjunctions of predicates from ℚ with the help of the operator of
ontology projection. Obtained association rules seem to be useful for mobile network
companies. The software processes the impersonal data for more than 10 million
subscribers. This is information for one month of mobile network using by subscribers.</p>
      <p>The set of characteristics of subscribers contains more than 90 different items1:
1) Personal features of subscriber,
2) Attributes that describe calls made by subscriber,
3) Attributes that describe the mode of using Internet
4) Attributes that describe the mode of using SMS,
5) Attributes that describe the mode of using MMS,
6) Attributes that describe the mode of using LBS (Location Based Services),
7) List of mobile services that were connected to subscriber,
8) Payment plan that is used by subscriber.</p>
      <p>The total amount of services that can be connected to subscriber is more than 90.
The total count of different payment plans is more than 1200.</p>
      <p>Thus, we have more than 10 million objects and nearly 1400 attributes. Part of
attributes is quantitative, most part of attributes (more than 1200) are binary.</p>
      <p>Let us notice that attributes of connected payment plans, services and personal
attributes are always filled. That is why we use only quantitative attributes for density
calculation. We calculate data density as follows: ! , where P is the number of
non!∗!
zero subscribers’ attributes, M is the total number of subscribers, N is the number of
quantitative attributes. For our data the data density is equal to 0.043.</p>
      <p>The data is stored in a file with Basket format. Basket is one of standard formats
for storing data of “objects-attributes” type in R.</p>
      <p>Let us consider an example of association rules which have conclusions consisting
of payment plans providing access to the Internet. The predicate () ∈ ℝ denotes
that subscriber’s payment plan includes unlimited Internet traffic of the special kind1.
The payment plans having the unlimited Internet traffic of this kind are !, !, ! ∈
ℚ!, where ! is “Unlimited”, ! is “United”, and ! is “Online”. These payment
plans provide unlimited access to Internet with different connection speed and
different price. Formally, in terms of ontological projections, it means that () ∈ !!,
() ∈ !!, () ∈ !! and   ∉ ! for every  ∈ ℚ\ !, !, ! .</p>
      <p>Mined association rules have premises with various sets of personal features of
subscribers from ℙ and the conclusion   . The automatically chosen rules have
rather high confidence and support (see examples 1 and 2, table 1).</p>
      <p>After that the predicate   is substituted by the equivalent disjunction
(! ∨ ! ∨ !) in the conclusions of the association rules. Table 1 shows that
substituting the disjunction (! ∨ ! ∨ !) by any of these predicates ! notably decreases
both confidence and support of the association rules.</p>
      <p>Thus, the new association rules generated by the algorithm in the extended formal
context (, ∆∨!, ⊨) have higher support and confidence as compared to rules with the
same premise which may be found in the original formal context (, ∆∨!, ⊨).
1 Due to NDA, the details of the attribute list and characteristics !, ! cannot be given. So in
the examples below, the real names of characteristics ! and ! have been changed.
Example 3
!!!, … , !!! → !
!!!, … , !!! → 
!!!!, … , !!!! → !
!!!!, … , !!!! → !
!!!!, … , !!!! → !
!!!!, … , !!!! → !
!!!!, … , !!!! → !
!!!!, … , !!!! → !
!!!!, … , !!!! → !
2%
10%
5%
4%
82%
40%
38%
!!!!, … , !!!! → (! ∨ ! ∨ ! ∨ !) 6% 51%</p>
      <p>If we would process association rules just in the formal context (, ∆∨!, ⊨) without
using the signature ℝ, then many conclusions of mined rules will be non-meaningful
disjunctions. Let us consider Example 3 in Table 1. Here  = (! ∨ ! ∨ ! ∨ ! ∨
! ∨ ! ∨ !) ∈ ∆∨! , services ! provide unlimited Internet, and services ! provide
unlimited SMS. Here ! is “unlimited free SMS for month with a fixed price”, ! is
“1000 free SMS for month with a fixed price”, ! is “unlimited cheap SMS”, and !
is “discount for SMS, using with special conditions”. The confidence of the
association rule !!!!, … , !!!! →  is high enough. The value is much greater than the
confidence of rules !!!!, … , !!!! → ! and !!!!, … , !!!! → ! , but the mobile operator
cannot use this association rule for recommendations, because it contains non-related
services ! and ! in the conclusion. However, if we consider the association rule
!!!!, … , !!!! → (! ∨ ! ∨ ! ∨ !), we can see that this rule has low confidence.
5</p>
      <p>Conclusion</p>
      <p>The paper is devoted to methods for identifying payment plans and services by
mobile operators which would be most useful for the given mobile network
subscribers. We use the Case Model ,  for mobile subscriber’s behavior description. The
Case Model is based on depersonalized subscribers’ data provided by mobile
operator. Objects (elements of the model) are mobile subscribers. The signature of the Case
Model consists of unary predicates. These predicates describe individual subscriber’s
features (accruals, traffics) or features of payment plans and services. We construct
the formal context (, ∆, ⊨) based on the Case Model. Then we mine association
rules describing payment plans and services that are commonly used by subscribers
with given features. After that we consider the formal context (, ∆!, ⊨). Our
experiments show that interesting association rules have low confidence values in this
context. That is why they cannot be used by mobile operator for any recommendations.</p>
      <p>To improve association rules quality we deal with an extension of this formal
context, the formal context , ∆!!, ⊨ . Using this context we can find association rules
with high confidence. However, a big part of mined rules have conclusions which are
disjunctions of non-related services, e.g. ‘Song instead of Beep’ and ‘Unlimited
Internet’. That is why such association rules could not be used for recommendations</p>
      <p>Finally, we consider enriched signature  instead of the signature  to find
semantically useful disjunctions. Signature  contains predicates that describe specific
features of payment plans and services. Using the formal context (, ∆!, ⊨) we
compute association rules such that their conclusions are predicates of the signature
ℝ. We transform the obtained association rules into association rules of the formal
context , ∆!!, ⊨ using the Ontological Model , !,  !, ! . We substitute the
predicate in the conclusion of an association rule by disjunction of predicates of the
initial signature . As the result we obtain association rules of the formal context
, ∆!!, ⊨ . These rules have high confidence and support, and the conclusions of
these rules are completely meaningful for the mobile network operator as well as for
mobile network subscribers. Mined association rules allow making recommendations
for customers who will be interested in information about these services and tariffs.
Acknowledgment The reported study was partially supported by Russian
Foundation for Basic Research, research project No. 14-07-00903-a.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Han,
          <string-name>
            <given-names>J</given-names>
            .,
            <surname>Pregibon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Mannila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Altman</surname>
          </string-name>
          , R. B.:
          <article-title>Emerging scientific applications in data mining</article-title>
          .
          <source>Communications of the ACM</source>
          ,
          <volume>45</volume>
          (
          <issue>8</issue>
          ),
          <fpage>54</fpage>
          -
          <lpage>58</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Surendiran</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rajan</surname>
            ,
            <given-names>K.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sathishkumar</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Study on the Customer targeting using Association Rule Mining</article-title>
          .
          <source>International Journal on Computer Science and Engineering</source>
          ,
          <volume>2</volume>
          (
          <issue>7</issue>
          ),
          <fpage>2483</fpage>
          -
          <lpage>2484</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Priss</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Formal concept analysis in information science</article-title>
          . In: Blaise C, ed.
          <source>Annual Review of Information Science and Technology. ASIST</source>
          . John Wiley &amp; Sons (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S. O.</given-names>
          </string-name>
          :
          <article-title>Galois Connections in Data Analysis: Contributions from the Soviet Era and Modern Russian Research</article-title>
          . In: Formal Concept Analysis: Foundations and
          <string-name>
            <surname>Applications (B. Ganter</surname>
          </string-name>
          , G. Stumme, R. Wille, Eds.),
          <source>Lecture Notes in Artificial Intelligence</source>
          (Springer),
          <article-title>State-of-the Art Ser</article-title>
          .,
          <volume>3626</volume>
          ,
          <fpage>196</fpage>
          -
          <lpage>225</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Üstündag</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bal</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Evaluating Market Basket Data with Formal Concept Analysis</article-title>
          .
          <source>International Symposium Chaos, Complexity and Leadership</source>
          , Springer Proceedings in Complexity (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Furletti</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gabrielli</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Renso</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rinzivillo</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Analysis of GSM calls data for understanding user mobility behavior</article-title>
          .
          <source>Proceedings of the IEEE International Conference on Big Data</source>
          ,
          <fpage>550</fpage>
          -
          <lpage>555</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Pawar</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aggarwal</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          :
          <article-title>Associative Rule Mining of Mobile Data Services Usage for Preference Analysis</article-title>
          ,
          <source>Personalization &amp; Promotion. Proceedings of WSEAS International Conference on Simulation, Modeling and Optimization</source>
          , Izmir, Turkey (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Agrawal</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Imieliński</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Swami</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mining association rules between sets of items in large databases</article-title>
          .
          <source>Proceedings of the 1993 ACM SIGMOD international conference on Management of data - SIGMOD '93</source>
          (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Szathmary</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Napoli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          :
          <article-title>ZART: A multifunctional itemset mining algorithm</article-title>
          .
          <source>CLA</source>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Burusco</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fuentes-Gonzalez</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>The study of L-fuzzy concept lattice</article-title>
          .
          <source>Mathw Soft Comput</source>
          ,
          <volume>3</volume>
          ,
          <fpage>209</fpage>
          -
          <lpage>218</lpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Chueh</surname>
          </string-name>
          , H.-E.:
          <article-title>Mining target-oriented fuzzy correlation rules to optimize telecom service management</article-title>
          .
          <source>International Journal of Computer Science &amp; Information Technology</source>
          ,
          <volume>3</volume>
          (
          <issue>1</issue>
          ),
          <fpage>74</fpage>
          -
          <lpage>83</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Bosc</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pivert</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prade</surname>
          </string-name>
          , H.:
          <article-title>On fuzzy association rules based on fuzzy cardinalities</article-title>
          .
          <source>Proceedings of the IEEE International Fuzzy Systems Conference</source>
          ,
          <volume>461</volume>
          -
          <fpage>464</fpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Chueh</surname>
            ,
            <given-names>H.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>N.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          , N.Y.:
          <article-title>Mining Target-oriented Fuzzy Correlation Rules in Telecom Database</article-title>
          .
          <source>Proceedings of the 2009 International Conference on Advances in Social Networks Analysis and Mining</source>
          ,
          <volume>399</volume>
          -
          <fpage>404</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>N. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chueh</surname>
          </string-name>
          , H.-E.:
          <article-title>Fuzzy Correlation Rules Mining</article-title>
          .
          <source>Proceedings of the 6th WSEAS International Conference on Applied Computer Science</source>
          ,
          <volume>13</volume>
          -
          <fpage>18</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Naydanov</surname>
            ,
            <given-names>Ch.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sazonova</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          :
          <article-title>Development of automated methods for the prevention of risks of critical conditions, based on the analysis of the knowledge extracted from the medical histories</article-title>
          .
          <source>Proceedings of the International Conference on Biomedical Engineering and Computational Technologies</source>
          , Novosibirsk,
          <fpage>47</fpage>
          -
          <lpage>52</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakhyaeva</surname>
            ,
            <given-names>G.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yasinskaya</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          :
          <article-title>Software system for the diagnosis of the spine diseases using case-based reasoning</article-title>
          .
          <source>Proceedings of the International Conference on Biomedical Engineering and Computational Technologies</source>
          , Novosibirsk,
          <fpage>150</fpage>
          -
          <lpage>155</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D. E.</given-names>
          </string-name>
          :
          <article-title>The solution of the problem of information retrieval based on ontologies</article-title>
          .
          <source>Biznes-informatika, 1</source>
          ,
          <fpage>3</fpage>
          -
          <lpage>13</lpage>
          (
          <year>2008</year>
          )
          <article-title>(In Russian)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          :
          <article-title>Virtual catalog: the ontology-based technology for information retrieval</article-title>
          .
          <source>In: Knowledge Processing and Data Analysis. LNAI 6581</source>
          , Springer-Verlag Berlin Heidelberg,
          <year>2011</year>
          , pp.
          <fpage>164</fpage>
          -
          <lpage>183</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poelmans</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Knowledge representation and processing with formal concept analysis</article-title>
          .
          <source>In: Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery</source>
          ,
          <volume>3</volume>
          (
          <issue>3</issue>
          ),
          <fpage>200</fpage>
          -
          <lpage>215</lpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Rudolph</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Exploring relational structures via FLE</article-title>
          . In: Wolff K.E.,
          <string-name>
            <surname>Pfeiffer H.D.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Delugach H</surname>
          </string-name>
          .S., Eds. ICCS, LNAI
          <volume>3127</volume>
          ,
          <fpage>196</fpage>
          -
          <lpage>212</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sertkaya</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Completing description logic knowledge bases using formal concept analysis</article-title>
          . In: Eklund P, eds.
          <source>Proceedings of the International Joint Conference on Artificial Intelligence</source>
          ,
          <fpage>230</fpage>
          -
          <lpage>235</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D. E.</given-names>
          </string-name>
          :
          <article-title>Lattices of relatively axiomatizable classes</article-title>
          .
          <source>In: Lecture Notes in Artificial Intelligence</source>
          ,
          <volume>4390</volume>
          ,
          <fpage>221</fpage>
          -
          <lpage>239</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wille</surname>
          </string-name>
          , R.:
          <article-title>Formal Concept Analysis</article-title>
          .
          <source>Mathematical Foundations</source>
          . Berlin: Springer (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Yakhyaeva</surname>
            ,
            <given-names>G.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yasinskaya</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          :
          <article-title>Application of Case-based Methodology for Early Diagnosis of Computer Attacks</article-title>
          .
          <source>Journal of Computing and Information Technology</source>
          ,
          <volume>22</volume>
          (
          <issue>3</issue>
          ),
          <fpage>145</fpage>
          -
          <lpage>150</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S. O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mahalova</surname>
            ,
            <given-names>T.P.</given-names>
          </string-name>
          :
          <article-title>Concept interestingness measures: a comparative study</article-title>
          .
          <source>Proceedings of the Twelfth International Conference on Concept Lattices</source>
          and
          <string-name>
            <surname>Their Applications</surname>
          </string-name>
          Clermont-Ferrand, France,
          <volume>1466</volume>
          ,
          <fpage>59</fpage>
          -
          <lpage>72</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakhyaeva</surname>
            ,
            <given-names>G.E.</given-names>
          </string-name>
          :
          <article-title>Fuzzy logics and fuzzy model theory</article-title>
          .
          <source>Algebra and Logic</source>
          ,
          <volume>54</volume>
          (
          <issue>1</issue>
          ),
          <fpage>74</fpage>
          -
          <lpage>80</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Yakhyaeva</surname>
            ,
            <given-names>G.E.</given-names>
          </string-name>
          :
          <article-title>Fuzzy model truth values</article-title>
          .,
          <source>Proceedings of the 6-th International Conference Aplimat</source>
          , Bratislava, Slovak Republic,
          <fpage>423</fpage>
          -
          <lpage>431</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>