<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Application of Boolean-valued models and FCA for the development of ontological models</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dmitry Palchunov</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gulnara Yakhyaeva</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>The paper is devoted to the development of methods of ontology supported knowledge discovery in the field of mobile network subscribers. We develop the ontological model of the domain of mobile networks. This ontological model is intended to describe the behavior of mobile network subscribers. The ontological model is based on the four-level model of knowledge representation. In the paper, special attention is given to the third level which represents the set of cases from the domain. For the analysis of domain cases and for the generation of fuzzy knowledge about the domain we use Boolean-valued models, fuzzy models and Formal Concept Analysis. To describe the set of cases from the domain we use formal contexts; objects of these formal contexts are models representing sets of subscribers. We study formal contexts generated by Boolean-valued models, and formal concepts of these formal contexts. We obtain a description of theories of classes of domain cases in the language of formal concepts.</p>
      </abstract>
      <kwd-group>
        <kwd>Boolean-valued model</kwd>
        <kwd>fuzzy model theory</kwd>
        <kwd>ontology</kwd>
        <kwd>ontological model</kwd>
        <kwd>mobile networks</kwd>
        <kwd>mobile network subscribers</kwd>
        <kwd>FCA</kwd>
        <kwd>formal context</kwd>
        <kwd>formal concept</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The article is devoted to the development of an ontological model of the domain of
mobile networks. The ontological model is based on the four-level model of
knowledge representation [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. We apply model-theoretical methods [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], theory of
fuzzy models [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and FCA [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] to construct the ontological model.
      </p>
      <p>
        The present investigations continue the studies begun in [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] the
ontological model of the domain of mobile networks was used to determine which tariffs and
services of the mobile operator are most interesting and useful for a given mobile
network user. In this article we expand the borders of our consideration of the
domain. We are interested in revealing high-level characteristics of the subscriber:
income level, social status, mobility, interests, preferences, etc. The elucidation of
highlevel characteristics is necessary to predict the behavior of the subscriber.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Thus we need to consider not only properties of individual subscribers, but also the</title>
      <p>
        interaction of subscribers (for example, calls between subscribers and so on).
Therefore, in contrast to [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], we need to consider not only unary predicates, but also binary
predicates to describe the domain ontology. A case model of this domain is
represented as a set of countable algebraic systems.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Next, in the paper we describe a method for constructing a formal context for the case model (using the notion of a Boolean-valued model) and a method of transitioning to an object-clarified context.</title>
    </sec>
    <sec id="sec-4">
      <title>This work is mainly theoretical. The results of practical implementation will be described in the next paper.</title>
      <p>2</p>
      <p>
        Ontological model of the domain of mobile networks
The ontological model of the domain of mobile networks is constructed on the basis
of the four-level model of knowledge representation [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. We call a tuple
 = 〈 ,  ,   ,   ,   〉
an ontological model of the domain. Here  is the set of cases of the domain,  is the
signature of the domain,   is the analytic theory of the domain,   is the theory of
the domain and   is the fuzzy theory of the domain.
      </p>
      <p>
        The first step of the construction of the ontological model is the description of the
ontology of the domain. From the model-theoretical point of view, the construction of
the domain ontology consists of describing a signature σ (i.e. the set of key concepts)
and a set of axiom    of the given domain [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ]. The pair 〈 ,    〉 generates the
analytic theory   , i.e. description of sense of the key concepts of the domain,
definitions of used notions. The theory of the domain   represents general (universal)
knowledge of the domain.
      </p>
      <p>We consider six classes of concepts to determine the signature   of the object
domain  = “Mobile networks”:
1.   represents individual indicators of subscribers, and contains two parts:   1 are
traffics and   2 are accruals.
2.   represents different tariff plans and services.
3.   represents properties and characteristics of various tariff plans, services and
options; for example, the number of free minutes of talk, the volume of the SMS
package, etc.</p>
      <sec id="sec-4-1">
        <title>4.   represents concepts which express different interests of subscribers.</title>
      </sec>
      <sec id="sec-4-2">
        <title>5.   represents concepts which express subscriber's social status.</title>
        <p>6.   represents concepts which express relationships and interactions between
subscribers: calls / SMS / MMS of one subscriber to another and so on.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Note that the concepts from the classes   ,   ,   ,   ,   represent different</title>
        <p>properties of subscribers; these concepts are formalized as unary predicates. The
concepts from the class   represent relationships and interactions between subscribers;
these concepts are formalized as binary predicates.</p>
        <p>
          The presented classes of concepts have a hierarchical structure which is
described by a set of axioms “hyponym-hypernym”. For these classes of concepts we
present axioms of completeness and axioms of including. A detailed description of
these axioms is given in [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. We present a set of axioms of irreflexivity for the class of
concepts   . For example, for any concept  ( ,  ) ∈   we formulate an axiom
¬ ( ,  ) which means that no subscriber can call to himself. This concludes the first
step of the ontological model's constructing.
        </p>
        <p>At the second step of the construction of the ontological model, we present the
set    of general statements about the domain. The set    is considered to be
true at the moment but may be changed at the future time. This knowledge is
synthetic, in contrast to the analytical knowledge presented in the ontology. The synthetic
knowledge does not follow from the meaning of the terms used in the description of
the domain. The truth value of this knowledge depends on the present state of the real
world. An example of such knowledge is the statement that a given tariff and a
specific service of the mobile operator are not compatible.</p>
        <p>The set of all axioms    ∪    generates the theory of the domain   , i.e.,
a set of statements which are true in the given domain. This concludes the second step
of the ontological model's constructing.</p>
        <p>The third step of the building the ontological model is a formalization of
empirical knowledge about the domain, i.e., knowledge about the concrete precedents
(cases) of the given object area. In the domain 
the set  of subjects is the set of
various individuals and organizations using mobile network services, etc. Note that
the set of subjects  is finite at each point of time, but it is constantly changing in
dynamics. Therefore we may consider the set  as potentially infinite. Thus in this
paper we consider a countable set A of subjects.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Let us consider a set</title>
      <p>(instance) of the domain 
the signature  
on the set A.</p>
      <p>= { 1,  2, … } of the subjects of the domain. Each case
determines an algebraic system  = ⟨ ,   ⟩, i.e., defines</p>
      <p>Further, to simplify the formalization, we will consider models  = ⟨ ,   ⟩ in
the signature (  ) , enriched by constants for all elements of the model:
(  ) =   ∪ {  |  ∈  }.</p>
      <p>So, for simplicity, we denote  =   , 

= (  )
 and   = ⟨ ,   ⟩.</p>
    </sec>
    <sec id="sec-6">
      <title>Note that not every algebraic system</title>
      <p>= ⟨ ,   ⟩ is the case of the domain  .</p>
      <p>We say that a model   is a domain’s case if   ⊨    ∪    .</p>
    </sec>
    <sec id="sec-7">
      <title>To solve different problems we may consider different sets of cases  ⊆</title>
      <p>(  ). For example, the set of cases</p>
      <p>may describe temporal "slices" of the domain,
or geolocation "slices" of the domain. Also, the set  may be used to describe the
behavior of different groups of subscribers.</p>
    </sec>
    <sec id="sec-8">
      <title>Empirical knowledge completely depends on the selection of the set of cases</title>
      <p>⊆  (  ) of the domain and serves as a source of generating a new knowledge
about the given domain. Below we will be construct the case model of the domain
based on the selected set of cases  .</p>
    </sec>
    <sec id="sec-9">
      <title>Using the presented formalization of the case model, we can identify high</title>
      <p>level characteristics of mobile network subscribers and make portraits of mobile users'
segments. To do this, we generate different Boolean-valued and fuzzy models (see
Section 3) and construct corresponding formal contexts for given case models (see
Section 4).</p>
      <p>( ) ⇋ { |    
 ( ) ⇋ { |    
 ( ) ⇋ { |</p>
      <p />
      <p>},
 } and
 }.</p>
    </sec>
    <sec id="sec-10">
      <title>For a sentence  ∈  ( ) and a model  ∈  ( ) we denote  ⊨  if the sentence  is true in the model  .</title>
      <p>
        Definition 1 [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Let
      </p>
      <p>be a complete Boolean algebra and  : S( A) →  . A
triple   = 〈 ,   ,  〉 is called a Boolean-valued model if the following conditions</p>
    </sec>
    <sec id="sec-11">
      <title>We use the notion of a fuzzy model to formalize the estimated knowledge of the object domain (the fourth level of the construction of the ontological model). Each fuzzy model is a special case of the fuzzification of some Boolean-valued model [12,</title>
      <p>
        Definition 2 [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Let   = 〈 ,  A,  〉 be a Boolean-valued model, where
 : S( A) →  , and ℎ:
      </p>
      <p>
        → [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] be a mapping for which ℎ(0) = 0 and ℎ(1) = 1.
      </p>
      <p>
        We define a valuation  : S( A) → [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] as a composition  ( ) = ℎ( ( )).
A triple   = ⟨ ,   ,  ⟩ is called a fuzzification of the Boolean valued-model   via
the mapping ℎ.
      </p>
      <p>
        Definition 3 [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The mapping ℎ:  → [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] is called an additive homomorphism
      </p>
      <p>Preliminaries: Boolean-valued models and fuzzy models
the
present
paper
a
model
(an
algebraic
system)
is
a
tuple
= 〈 ;  1, . . . ,   ,  1, . . . ,   〉. The set | | =  is called the universe of the model,
 1, . . . ,   are predicates defined on the set  and  1, . . . ,   are constants. The tuple
 = 〈  1, . . . ,   ,  1, . . . ,   〉 is called the signature of the algebraic system  .</p>
      <p>A formula having no free variables is called a sentence. For a signature  we
de ( ) = ̅̅(̅̅̅̅);</p>
      <p>
        ( ∨  ) =  ( ) ∪  ( );
 ( &amp;  ) =  ( ) ∩  ( );  ( →  ) = ̅̅(̅̅̅̅) ∪  ( );
 (∀ ( )) = ⋂  ( (  ));  (∃ ( )) = ⋃  ( (  )).
In
note:
hold:
if
(1) ℎ preserves the order, i.e., ℎ is a homomorphism ℎ:  → [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] of posets
with constants 0 and 1;
(2) ℎ is additive, i.e.,
      </p>
      <p>∩  = 0 ⇒ ℎ( ∪  ) = ℎ( ) + ℎ( ) for any  ,  ∈  .</p>
      <p>
        Definition 4 [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. A fuzzy model   = ⟨ ,   ,  ⟩ is a fuzzification of a
Booleanvalued model   = 〈 ,  A,  〉 via an additive homomorphism.
4 Main results: formal contexts for Boolean-valued models
Remark 5. Let   = 〈 , A,  〉 be a Boolean-valued model and  :S(σA) →  .
Consider the formal context ( ,  (  ),  ), where    ⇔  ( ) =  . Note that the
nonempty extents of formal concepts are one-element sets.
      </p>
      <p>Proposition 9. Let ( , Γ) ∈  ( ( ),  ( A),   ). Then Γ is a theory of the
signature  A, i.e., for any  ∈ S( A) if Γ ⊢  then  ∈ Γ.</p>
      <p>Proof. Let ( , Γ) ∈  ( ( ),  ( A),   ). Let us show that Γ is a theory. Suppose
that  ∈  (  )and Γ ⊢  . Prove that  ∈ Γ. We have  ′ = Γ; consequently, we must
only show that  ∈  ′.</p>
      <p>Consider  ∈  , then  ∈  ( ). It is true that  ′ = Γ, so for any  ∈ Γ, we have
    , therefore  ≤  ( ). Hence, by Proposition 7, we have   ⊨  .</p>
      <sec id="sec-11-1">
        <title>Consequently, for any  ∈ Γ, it is true that   ⊨  , which means that   ⊨ Γ. In</title>
        <p>volving the fact that Γ ⊢  , we conclude that   ⊨  . Therefore, by Proposition 7,
we have  ≤  ( ), so     .</p>
        <p>Thus, we have proved that     for any  ∈  . Then  ∈  ′ = Γ. Therefore, we
have shown that for any  ∈  (  ), if Τ ⊢  then  ∈ Τ. Hence, Γ is a theory. ∎</p>
        <p>Theorem 10. Let   = 〈 , A,  〉 be an atomic Boolean-valued model. There
exists an atomic Boolean-valued model   1 = 〈 , A,  1 〉, where  1:S( A) →  1, and
an epimorphism g:  →  1 such that
1) the formal context ( ( 1), (  ),  1) is object-clarified;
2) for any φ ∈ S( A) we have g( ( )) =  1( );
3) for any  ∈ At( ), if  ( ) ≠ 0 then  ( ) ∈ At( 1);
4) for any  ∈ At( )and  ∈ S( A), if  ( ) ≠ 0 then     ⇔ g( )  1 .
Proof. Let   = 〈 , A,  〉 be a Boolean-valued model and  be atomic.</p>
      </sec>
      <sec id="sec-11-2">
        <title>Suppose that the formal context ( ( ), (  ),  ) is not object-clarified. Consider</title>
        <p>an equivalence relation ~ on the set  ( ) of the atoms of the Boolean algebra 
defined as follows: for  , ∈  ( ) we have  ~ iff for any  ∈  (  )it is true that
    ⇔     .</p>
        <p>Consider the quotient set  /~ , and denote  =  ( )/~ .</p>
        <p>We chose exactly one element  [ ] ∈ [ ] in each equivalence class [ ] ∈  ( )/~.</p>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>Denote</title>
      <p>= { [ ] | [ ] ∈  } ⊆  ( ) and  = ⋃  .
 ∈  ; here  ⁄ is the quotient class of the element  .</p>
      <p>Define a mapping  1: (  ) →  1 as follows:
( ∈( ( )\ ))</p>
      <p>Consider a principal ideal  =  ̂ = { ∈  |  ≤  } of the Boolean algebra  :
 ⊲  .</p>
      <p>Consider a Boolean algebra  1 =  ⁄ which is the quotient algebra of the Boolean
algebra  by the ideal  .</p>
      <p>Consider an epimorphism  : →  1 defined as follows:  ( ) =  ⁄ for any
Lemma 11.   1 = 〈 ,  , 1〉 is a Boolean-valued model.</p>
      <p>Proof. Consider  , ∈  (  ). We have
 1( ∨  ) =  ( ∨  )⁄ =
 ( )∪  ( )⁄ =
 ( )⁄ ∪
 ( )⁄ =  1( )∪  1( );
 1( &amp; ) =  ( &amp; )
⁄ =
 ( )∩  ( )
 ( )</p>
      <p>( )
⁄ =
⁄ ∩
⁄ =  1( )∩  1( );
 1( →  ) =  ( →  )⁄ =
 ( )∪  ( )⁄ =
 ( )⁄ ∪
 ( )⁄ =  1( )∪  1( ).</p>
      <p>Consider  ( ) ∈  (  ). We have
 1(∀ ( )) =  (∀ ( ))⁄ = ⋂ ∈  ( (  ))⁄ =
= ⋂
 ( (  ))⁄ = ⋂ 1( (  ));
 1(∃ ( )) =  (∃ ( ))⁄ = ⋃ ∈  ( (  ))⁄ =</p>
      <p>Note that the equalities
and
= ⋃
 ( (  ))⁄ = ⋃ 1( (  )).
⋃ ∈  ( (  ))⁄ = ⋃
 ( (  ))⁄


are true in virtue of the fact that the Boolean algebra  is complete.</p>
      <p>Thus, we have shown that   1 = 〈 , A,  1〉 is Boolean-valued model.</p>
    </sec>
    <sec id="sec-13">
      <title>The lemma is proved.</title>
      <p>∎</p>
    </sec>
    <sec id="sec-14">
      <title>Continue the proof of the theorem. First we prove that the set of atoms</title>
      <p>( 1) = { ⁄ |  ∈  }.</p>
      <p>Let  ∈  . Then  ∉  and so,  ⁄ ≠ 0. If  ⁄ ≠ 0 and  ⁄ ≤  ⁄ then
 ⁄ =  ⁄ ∩  ⁄ =  ∩  ⁄.</p>
      <p>⁄ =  ⁄ . Thus,  ⁄ is an atom of the Boolean algebra  1.</p>
      <p>On the other hand, let  ⁄ be an atom of the Boolean algebra  1. Then  ⁄ ≠ 0
and so,  ≠ 0. The Boolean algebra  is atomic, hence the set of atoms  ( ) =
{ ∈  ( )|  ≤  } ≠ ∅ and  = ⋃ ∈ ( ) . Involving the fact that  ⁄ ≠ 0 we
conclude that  ∉  =  ̂, consequently,  ≰  .</p>
      <p>We have  = ⋃ ∈ ( )\  and  = ⋃ ∈ ( ) , hence, if  ( ) ⊆  ( )\ then
 ≤  . Therefore,  ( ) ⊈  ( )\ , so  ( )∩  ≠ ∅.</p>
      <p>Consequently, there exists an atom  ∈  ( )∩  . Hence,  ∈  and  ≤  , so
 ⁄ ≤  ⁄ . As we proved above,  ∈  implies that  ⁄ is an atom of the Boolean
algebra  1. Involving the fact that  ⁄ is an atom we conclude that  ⁄ =  ⁄ and so,
So,  ∩  ≠ 0 and  ∩  ≤  , therefore,  ∩  =  . Hence,  ∩  ⁄ =  ⁄ and so,</p>
    </sec>
    <sec id="sec-15">
      <title>Thus, we have proved the statement (4). Now let us prove that the formal context</title>
      <p>( ( 1), (  ),  1) is object-clarified – the statement (1).</p>
      <p>Lemma 12. For every  ∈  ( ), and every  ∈  (  ), if  ( ) ≠ 0 then
    ⇔  ( )  1 .</p>
      <p>Proof. Consider  ∈  ( ) and  ∈  (  ). Let  ( ) ≠ 0. Let us prove that
    ⇔  ( )  1 .</p>
      <p>(⇒) Suppose that     holds. Then  ≤  ( ), hence  ⁄ ≤  ( )⁄ =  1( ).
Therefore, we have ( ⁄ )   1 and so,  ( )  1  holds.</p>
      <p>(⇐) Suppose that     doesn’t hold. Then  ≰  ( ), so,  ≠  ∩  ( ). The
element  is an atom and we have  ≠  ∩  ( ) ≤  . Then  ∩  ( ) = 0, hence
 ⁄ ∩  ( )⁄ =  ∩  ( )⁄ = 0.</p>
      <p>Since  ⁄ =  ( ) ≠ 0 , we have  ⁄ ≠  ⁄ ∩  ( )⁄ , hence,  ⁄ ≰  ( )⁄ =
 1( ), i.e.,  ( ) ≰  1( ). Therefore,  ( )  1  doesn’t hold.</p>
    </sec>
    <sec id="sec-16">
      <title>The lemma is proved. ∎</title>
      <p>⁄ ∈ { ⁄ |  ∈  }. Therefore,  ( 1) = { ⁄ |  ∈  }.</p>
      <p>Thus, that for any  ∈  ( ) if  ∈  ( )\ then  ≤  , hence,  ⁄ = 0. If
 ∈  then  ⁄ ∈  ( 1). Consequently, the statement (3) holds.</p>
      <sec id="sec-16-1">
        <title>Next, by the definition of the epimorphism  : →  1 we have</title>
        <p>( ( )) =  ( )⁄ =  1( ).</p>
      </sec>
    </sec>
    <sec id="sec-17">
      <title>Therefore, the statement (2) holds.</title>
      <p>Consider  1, 2 ∈  . Let  1⁄ ≠  2⁄ . Then there are atoms  1, 2 ∈  ( ) such
that  1 =  [ 1] and  2 =  [ 2]. Hence,  1 ∈ [ 1] and  2 ∈ [ 2]. Since  1 ≠  2, we
have [ 1] ≠ [ 2], so,  1 ≁  2. Therefore, there is a sentence  ∈  (  )such that only
one of the statements  1    and  2    holds. Suppose that  1    holds and  2   
doesn’t hold. We conclude by Lemma 12 that  ( 1)  1  holds and  ( 2)  1 
doesn’t hold. Therefore, the rows corresponding to the objects  1⁄ and  2⁄ of the
Recall that  ( A) = {〈{  |  ∈  },  A〉 |  

≠   for  ≠  } and
 ℎ( ) = { ∈ S( A)| 
⊨  } is the theory of the class 
⊆  ( A).</p>
    </sec>
    <sec id="sec-18">
      <title>We represent the set of the cases of the domain (3rd level of the ontological model)</title>
      <p>as a class of models</p>
      <p>⊆  ( A). So, it is interesting and important to solve the
following</p>
    </sec>
    <sec id="sec-19">
      <title>Problem 13. How to describe the theories of the classes</title>
      <p>⊆  ( A).</p>
      <sec id="sec-19-1">
        <title>Theorem 14. Let  be a theory of the signature   . There exists a class  ⊆  (  )</title>
        <p>such that  =  ℎ( )if and only if there exists a Bolean-valued model   such that
( ′,  ) ∈  ( ( ),  (  ),   ).</p>
        <p>Proof. Let  be a theory in the signature   .</p>
        <p>(⇒) Consider a class 
a Boolean algebra 
as follows:  ( ) = {</p>
        <p>⊆  (  ). Let  =  ℎ( ). Denote  0 =  (  ). Consider
= 〈℘( 0); ∪,∩,−,∅, 0〉 and a mapping  : (  ) →  defined
∈  | 
⊨  } for a sentence 
∈  (  ).
formal context ( ( 1), (  ),  1) are different. Thus, the formal context
( ( 1), (  ),  1) is object-clarified.</p>
        <p>Proof. Let  , ∈  (  ). Then
 (¬ ) = { ∈  0 |  ⊨ ¬ } = { ∈  0 |  ⊭  } =
 \{ ∈  0 |  ⊨  } =  0\ ( ) =  ( );
 ( ∨  ) = { ∈  0 |  ⊨ ( ∨  )} =
= { ∈  0 |  ⊨  } ∪ { ∈  0 |  ⊨  } =  ( )∪  ( );</p>
        <p>( &amp; ) = { ∈  0 |  ⊨ ( &amp; )} =
= { ∈  0 |  ⊨  } ∩ { ∈  0 |  ⊨  } =  ( )∩  ( );
 (</p>
        <p>→  ) = { ∈  0 |  ⊨ ( ∨  )} =  ( )∪  ( ).</p>
        <p>Let  ( ) ∈  (  ). Then</p>
        <p>(∀ ( )) = { ∈  0 |  ⊨ ∀ ( )} =
= { ∈  0 |  ⊨  ( )for any ∈  } = { ∈  0 |  ⊨  (  )for any  ∈  } =
= ⋂{ ∈  0 |  ⊨  (  )} = ⋂ ( (  ));</p>
        <p>(∃ ( )) = { ∈  0 |  ⊨ ∃ ( )} =
= ⋃{ ∈  0 |  ⊨  (  )} = ⋃ ( (  )).
{ ∈  0 |  ⊨  ( )for some  ∈  } = { ∈  0 |  ⊨  (  )for some  ∈  } =</p>
      </sec>
    </sec>
    <sec id="sec-20">
      <title>The lemma is proved.</title>
      <p>Notice that the atoms of the Boolean algebra  = 〈℘( 0); ∪,∩,−,∅, 0〉 are
exactly the one-element subsets of the set  0. Hence,  ( ) = {{ } |  ∈  0}.</p>
      <p>Consider a formal context 〈 ( ), (  ),  〉. Let ℭ ∈  0 and  ∈  (  ). Then we</p>
      <p>Thus, we have {ℭ}    ⇔ ℭ ⊨  . Recall that  ⊆  0 =  (  ) and  =  ℎ( ).
Denote  ̃ = {{ } |  ∈  } ⊆  ( ). Then
 ̃′ = { ∈  (  ) | { }</p>
      <p>for any { } ∈  ̃}
= { ∈  (  ) |  ⊨ 
for any  ∈  } =  ℎ( ) =  .</p>
      <p>Therefore,  =  ′′ and the pair ( ′,  ) is a formal concept of the formal context
〈 ( ),  (  ),   〉, i.e., ( ′,  ) ∈  ( ( ),  (  ),   ).</p>
      <p>(⇐) Let   = 〈 ,   ,  〉 be a Boolean-valued model and a pair ( ′,  ) ∈
 ( ( ),  (  ),   ).`
any  ∈  .</p>
      <p>Denote  =  ′. Then  ⊆  ( ) and  ′ =  . Consider a class  = {  |  ∈  }.
We have proved above in the proof of Proposition 9 that in this case   ⊨  holds for</p>
      <p>Therefore, for any  ∈  we have  ⊨  . It means that  ⊨  . Hence,  ⊆
 ℎ( ) = { ∈  (  )|  ⊨  }.</p>
      <p>Let us show that  ℎ( ) ⊆  . Let  ∈  ℎ( ). Then  ⊨  , which means that
 ⊨  for any  ∈  . Consequently, for any  ∈  we have   ⊨  . By Proposition
7,   ⊨  implies that  ≤  ( ), hence,     holds.</p>
      <p>Thus, for any  ∈  we have     , then  ∈  ′ =  ′′ =  , i.e.,  ∈  . Therefore,
for any  ∈  ℎ( ) we have  ∈  , hence  ℎ( ) ⊆  , and so,  =  ℎ( ).
In the present paper we investigate the mathematical foundations of ontological
modeling of the domain of mobile networks. We use the four-level model of knowledge
representation to formalize this domain. We construct the case model at the third level
of ontological model creation, when we formalize the empirical knowledge. The case
model is presented by a set of countable algebraic systems. In the ontological model,
the high-level characteristics of mobile network subscribers are represented with the
help of first order theories of classes of algebraic systems of the special kind.</p>
    </sec>
    <sec id="sec-21">
      <title>Next, we describe a method of constructing a formal context for a Boolean-valued model which represents the case model. We show that, without loss of generality, we may consider only object-clarified formal contexts corresponding to the Booleanvalued models.</title>
    </sec>
    <sec id="sec-22">
      <title>We prove that the intents of formal concepts of formal contexts corresponding to</title>
      <p>Boolean-valued models are first order theories of the signature under consideration. In
the end, we solve the following problem: What are the theories of the classes
 ⊆  ( A)? We obtain a description of theories of the classes of domain cases in the</p>
    </sec>
    <sec id="sec-23">
      <title>The theorem is proved.</title>
      <p>5</p>
      <p>Conclusion
∎
language of formal concepts of the formal contexts corresponding to the
Booleanvalued models.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Naydanov</surname>
          </string-name>
          , Ch.,
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sazonova</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Development of automated methods for the prevention of risks of critical conditions, based on the analysis of the knowledge extracted from the medical histories</article-title>
          .
          <source>Proceedings of the International Conference on Biomedical Engineering and Computational Technologies</source>
          , Novosibirsk,
          <fpage>47</fpage>
          -
          <lpage>52</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakhyaeva</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yasinskaya</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Software system for diagnosing spinal diseases using case-based reasoning</article-title>
          . Proceedings - 2015
          <source>International Conference on Biomedical Engineering and Computational Technologies</source>
          ,
          <string-name>
            <surname>SIBIRCON</surname>
          </string-name>
          <year>2015</year>
          ,
          <volume>205</volume>
          -
          <fpage>210</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <issue>3</issue>
          .
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Keisler</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          : Model theory: 3rd ed. Amsterdam, New York: North-Holland, Elsevier Science Pub. Co. (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Pal'chunov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakhyaeva</surname>
          </string-name>
          , G.:
          <article-title>Fuzzy logics and fuzzy model theory</article-title>
          .
          <source>Algebra and Logic</source>
          ,
          <volume>54</volume>
          (
          <issue>1</issue>
          ),
          <fpage>74</fpage>
          -
          <lpage>80</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poelmans</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Knowledge representation and processing with formal concept analysis</article-title>
          .
          <source>Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery</source>
          <volume>3</volume>
          (
          <issue>3</issue>
          ),
          <fpage>200</fpage>
          -
          <lpage>215</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Poelmans</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ignatov</surname>
            ,
            <given-names>D.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dedene</surname>
          </string-name>
          , G.:
          <article-title>Formal concept analysis in knowledge processing: A survey on models and techniques</article-title>
          .
          <source>Source of the Document Expert Systems with Applications</source>
          ,
          <volume>40</volume>
          (
          <issue>16</issue>
          ),
          <fpage>6601</fpage>
          -
          <lpage>6623</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Pal</surname>
          </string-name>
          <article-title>'chunov, D.: Lattices of relatively axiomatizable classes</article-title>
          .
          <source>Lecture Notes in Artificial Intelligence</source>
          ,
          <volume>4390</volume>
          ,
          <fpage>221</fpage>
          -
          <lpage>239</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakhyaeva</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dolgusheva</surname>
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Conceptual Methods for Identifying Needs of Mobile Network Subscribers</article-title>
          .
          <source>International Conference on Concept Lattices and Their Applications CLA</source>
          <year>2016</year>
          ,
          <volume>147</volume>
          -
          <fpage>158</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The solution of the problem of information retrieval based on ontologies</article-title>
          .
          <source>Bisnes-informatika, 1</source>
          ,
          <fpage>3</fpage>
          -
          <lpage>13</lpage>
          (
          <year>2008</year>
          )
          <article-title>(In Russ</article-title>
          .)
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Palchunov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Virtual catalog: the ontology-based technology for information retrieval</article-title>
          .
          <source>In: Knowledge Processing and Data Analysis. LNAI 6581</source>
          , Springer-Verlag Berlin Heidelberg,
          <fpage>164</fpage>
          -
          <lpage>183</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Pulchunov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , Yakhyaeva G.:
          <article-title>Interval fuzzy algebraic systems</article-title>
          .
          <source>Mathematical Logic in Asia. Proceedings of the 9-th Asian Logic Conference</source>
          . World Scientific Publishers.
          <fpage>191</fpage>
          -
          <lpage>202</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Yakhyaeva</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yasinkaya</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>An algorithm to compare computer-security knowledge from different sources</article-title>
          .
          <source>ICEIS 2015 - 17th International Conference on Enterprise Information Systems, Proceedings</source>
          <volume>1</volume>
          ,
          <fpage>565</fpage>
          -
          <lpage>572</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Yakhyaeva</surname>
          </string-name>
          , G.:
          <article-title>Logic of fuzzifications</article-title>
          .
          <source>Proceedings of the 4th Indian International Conference on Artificial Intelligence, IICAI</source>
          <year>2009</year>
          ,
          <volume>222</volume>
          -
          <fpage>239</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Pal'chunov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakhyaeva</surname>
          </string-name>
          , G.:
          <article-title>Fuzzy algebraic systems</article-title>
          .
          <source>Vestnik NGU</source>
          ,
          <string-name>
            <surname>Mat</surname>
            <given-names>.</given-names>
          </string-name>
          , Mekh., Inf.,
          <volume>10</volume>
          , No.
          <volume>3</volume>
          ,
          <fpage>76</fpage>
          -
          <lpage>93</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>