<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Defuzzification of the initial context in Formal Concept Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>D E Samoilov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>V A Semenova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>S V Smirnov</string-name>
          <email>smirnov@iccs.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Control of Complex Systems of RAS</institution>
          ,
          <addr-line>Sadovaya Str., 61, Samara</addr-line>
          ,
          <country country="RU">Russia 443020</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Samara National Research University</institution>
          ,
          <addr-line>Moskovskoe Shosse, 34А, Samara, Russia, 443086</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Samara State Technical University</institution>
          ,
          <addr-line>Molodogvardeyskaya Str., 244, Samara, Russia, 443100</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <abstract>
        <p>The research field is the problem of extracting from the initial empirical material the formal concept lattice, which can serve as the basis of the formal ontology of the studied subject domain. The initial empirical material, i.e. the data of multidimensional observations and experiments, is characterized by incompleteness and inconsistency, conditioned by realities of empirical information accumulation. This leads to the fact that required for lattice building formal context can be previously presented only within the framework of some multivalued logic. It needs to be approximated in binary logic, since effective methods for derivation of formal concepts are developed only for unambiguous (binary) formal contexts. The exact solution of this problem, considering the properties existence constraints of objects in the studied subject domain, is difficult and in a certain sense is inadequate to expectations of subject exploring the subject domain. For defuzzification of the initial formal context heuristic was proposed, idea of which is to localize the approximation task of "soft" context within every group of dependent properties of each object of learning sample. The model reflecting such restrictions is formed as hierarchy of groups of dependent properties, which predetermines the recursive and multi-pass nature of the developed defuzzification algorithm.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Standardly, protocols of observations and experiments are drawn up as tables “object-properties”
(TOP) [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Most often, TOP contains the results of measuring the values of the certain properties set
of objects that are in the field of researcher view. Such TOPs are called multi-valued formal contexts
(FCs) for data analysis tasks [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. At the same time a very popular method of “object-properties” type
data mining now is the formal concept analysis (FCA) [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7">3-7</xref>
        ], which deals only with binary
(singlevalued) FCs:
      </p>
      <p>bij = «оobject gi  G* has the property mj  M»,
i.e. I = (||bij||)i=1,…, r; j=1,…, s, ||bij||  {Truth, False}.</p>
      <p>
        The main purpose of FCA is to extract clusters called formal concepts from tabular data. A
partially ordered set of all formal concepts is called a lattice of concepts, which can be considered as a
“skeleton” of the formal ontology of the studied KD [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8-10</xref>
        ].
      </p>
      <p>
        A single-valued FC can be obtained by a certain granulation of the information of a multi-valued
FC with help of the conceptual scales [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ]. Process of granulation depends on the objectives of the
KD studying. This granularity generation tool is similar to the linguistic variables introduced by Zadeh
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Fuzzy conceptual scaling [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ] leads to FC of the form (1) with a fuzzy relation I. A slightly
different approach to conceptual scaling that forms a fuzzy relation I was studied in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        In works [
        <xref ref-type="bibr" rid="ref17 ref18 ref19">17-19</xref>
        ], the genesis of a non-strict (in particular, fuzzy) FC (NFC) is considered from
more general positions and is generally associated with incompleteness and inconsistency of the
primary information about the studied KD. At the same time, it was established that fuzzy logic for
describing “soft” correspondence of “object-properties” is less adequate than more sophisticated
multi-valued logics. In [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ], in order to form the truth estimates of the BSP, it was proposed to use
vector logic [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], namely, VTF logic, which can be considered as the simplest generalization of Zadeh’s
fuzzy logic.
      </p>
      <p>
        Constructive use of a NFC is based on its -approximation, i.e. replacing in (1) fuzzy (or non-strict
in the case of using vector logics) relation I with its -section I () [
        <xref ref-type="bibr" rid="ref12 ref14 ref15 ref16 ref17 ref18 ref19">12, 14-19</xref>
        ]. Unfortunately, in the
general case a single-valued correspondence I () in the problem of formal concept analysis turns out to
be incorrect, because the standard -section procedure does not take into account the existential
dependencies between the measurable properties: incompatibility and conditionality of the objects
properties of the studied KD [
        <xref ref-type="bibr" rid="ref19 ref21 ref22">19, 21, 22</xref>
        ]. A comprehensive model of a system of measurable
properties (SMP) with restrictions on their existence was justified in [
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ]. This work is devoted to
the development of an algorithm for rational -approximation of a NFC, which takes into account the
complex organization of a SMP in FCA problems.
2. Truth evaluation of the propositions about the object properties
In VTF logic the truth of BSP bij is estimated by the vector Truth, False (figure 1):
||bij|| = b+ij, bij; b+ij, bij  [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ]; (b+ij + bij  1) = False.
      </p>
      <p>Each object of the training sample gi  G*, i = 1,…, r, is characterized in a NFC by the set of truth
vectors {||bij||}j = 1,…, s (figure 2). VTF-threshold of trust  =  +,   determines two regions in the
existence space of truth vectors. Location of the vector ||bij|| in one of these regions is interpreted as
falsity, and for other region it is interpreted as truth of the corresponding BSP (figure 3). On the other
hand, in the specified space for each vector ||bij|| two regions are defined, location of the trust threshold
 in one of them means falsity, and in the other - the truth of the BSP bij (figure 4).</p>
    </sec>
    <sec id="sec-2">
      <title>3. Patterns of groups of conjugate properties</title>
      <p>
        According to [
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ], the SMP is a hierarchies set of groups of conjugate properties (GCP), which is
formed as a product of subject hypothesizing about the structure of the conceptual description of the
studied KD. Each GCP hierarchy is formed by replacing in a supergroup one or more measurable
properties with a subgroup of such properties. The highest supergroup in the GCP nesting hierarchy is
proto-property, the lower subgroups in the hierarchy are the “leafy” GCP, that are matched to
measured properties.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ] it was established that there are three and only three basic patterns of subgroups
(subGCP) that replace one property in a supergroup:
 a group of two measurable properties, in which one property conditiones another;
 a group of n &gt; 1 incompatible measurable properties;
 a group of n &gt; 1 mutually conditioned properties.
bij
      </p>
      <p>E</p>
      <p>||bij||
U = 0, 0 T = 1, 0</p>
      <p>Figure 2. Set of truth vectors {||bij||}j = 1,…, s,
characterizing in a non-strict formal context BSP</p>
      <p>*
about object gi  G .
- location of the vector ||bij|| in this area</p>
      <p>means falsity of corresponding BSP;
- location of the vector ||bij|| in this area</p>
      <p>means truth of corresponding BSP.
- if the trust threshold  = +,   is
chosen in this area, then BSP with
vectorial truth evaluation b+ij, bij
recognized as true;
- if the trust threshold  = +,   is
chosen in this area, then BSP with
vectorial truth evaluation b+ij, bij
recognized as false.</p>
      <p>U = 0, 0 + T = 1, 0</p>
      <p>Figure 1. Representation bofijthe truth vector
||bij|| = b+ij, bij and truth constants of VTF logic
«True», «False», «Uncertainty», «Contradiction»,</p>
      <p>«Equivocal» (T, F, U, C, E).
U = 0, 0</p>
      <p>||bij||
b+ij</p>
      <p>C = 1, 1
b+
U = 0, 0  + T = 1, 0</p>
      <p>Figure 3. Determining of -section;  =  +,   of a non-strict set using the logical order
(or verisimilitude) for truth vectors in VTF logic: ||bxy|| &gt; , if b+xy   +, bxy   .</p>
      <p>b</p>
      <p>The nature of properties conjugacy in such GCP can be clearly reflected in the existence space of
truth vectors by connecting its points with appropriate arcs (figure 5a-c).</p>
      <p>Similarly can be represented two complex patterns of subgroups, which replace several properties
in a supergroup according to fixed rules (only in supergroups, where all properties are mutually
conditioned):
 a group of properties with several conditionalities (figure 6a);
 a group of properties with several incompatibilities and conditionalities (figure 6b).</p>
    </sec>
    <sec id="sec-3">
      <title>4. Rational -section of a non-strict formal context</title>
      <p>So, in order to apply effective FCA methods to extract formal concepts from a NFC, it is necessary to
ensure its correct -approximation in the presence of properties existence constraints (PEC).
T = 1, 0</p>
      <p>C = 1, 1
T = 1, 0
T = 1, 0
T = 1, 0</p>
      <sec id="sec-3-1">
        <title>4.1. Search of region of acceptable values of the trust threshold for the source data</title>
        <p>
          Formally, the problem can be reduced to constructing a single predicate “-section is correct” with a
vectorial argument  =  +,  , +,    [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ], where condition for confirming the truth of each
empirical BSP bij:
        </p>
        <p>b+ij  +  b ij   
(or, on the contrary, the necessary falsity of this BSP) should be combined with the implementation of
all relevant PEC. And then find the region (possibly, it will be empty) of existence of trust thresholds
 that deliver the value True to such predicate.</p>
        <p>
          In the general case, to build such predicate and identify the specified region is very difficult; an
example of constructing such predicate for the case when PEC is caused by incompatibility of some
part of measurable properties can be found in [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]. However, even assuming the possibility of such a
decision, it is very impractical to bind the subject who studies the KD with a need to select a threshold
only from a limited region. For example, with this approach the subject may not meet the intuitive
expectations from softening or tightening the trust threshold for the data representing the KD [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>4.2. Heuristic approach</title>
        <p>Instead of the described search the following heuristic is proposed:
 the subject is free to choose a threshold (the choice of -threshold is arbitrary);
 determined by a threshold  and, in general, the unacceptable composition of each object
properties of the sought-for single-valued FC (in figure 2 this corresponds to the emphasizing
of part of estimates ||bij|| according to the rule illustrated by figure 3) should be consistently
reduced due to the sequential cutting off of properties that violate PEC;
 the cut-off mechanism consists in local tightening of the trust threshold within each GCP in
the SMP.</p>
        <p>For unambiguous choice of “best” among trust thresholds -  =  +,  , - which tighten the
threshold  chosen by the subject and provide the necessary reduction of the GCP composition of the
object gi  G*, following criterias are proposed (figure 7):
 tightening vector length (in a rectangular metric)</p>
        <p>| + -  +| + |  -  | = ( + -  +) + (  -  )  min;
 truth region area of the tightened trust threshold</p>
        <p>
          (1 -  +)     max;
 reliability [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] of the tightening vector (“in coordinates of the tightening”)
        </p>
        <p>t+ - t = (  -  ) - ( + -  +)  max.</p>
        <p>The first and third criterias define two manifolds that are mutually perpendicular segments
(figure 7). This fact guarantees an unambiguous choice of  at consistent application of criterias for
the reduction of GCP members.</p>
        <p>The proposed heuristic method for obtaining the correct unambiguous approximation of a NFC is
effective.</p>
        <p>Indeed, the method is implemented for each object of the training sample separately, and at some
step one of following conditions will arise:
 either the properties set of an object gi begins to satisfy PEC (note that an empty set of
properties satisfies such constraints, but then an object with such properties “set” must be
qualified as unidentified by introducing a new property “unidentified object” into the
soughtfor FC);
 or it will be stated that there is a ineradicable contradiction between the initial context and
PEC: there are BSP about object gi with the truth estimate ||bij|| = 1, 0 (i.e. true in classical
two-valued logic), but violating PEC.</p>
      </sec>
      <sec id="sec-3-3">
        <title>4.3. Defuzzification algorithm of a non-strict formal context</title>
        <p>
          The algorithmization complexity of proposed heuristics is due to the multi-hierarchical structural
organization of the SMP [
          <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
          ] - q.v. Section 3. At the same time, it is clear that the work begins
with the input by a subject of the trust threshold for the source data  =  +,  that suits him and
performing the standard -section of the correspondence “object-properties” of a NFC. The algorithm
core is the correction cycle of the obtained -approximation of a NFC, performed for each object
gi  G*. Therefore, in the further description of “corrective steps” we will omit the mention of the
object being processed, implying by default this uniqueness characteristic of the considered GCPs. But
first we note the following:
 A GCP is excluded from the desired FC when all nested GCP (and all “leafy” sub-GCP which
are matched to measured properties) are excluded from it. The local (for the GCP) trust
threshold for the source data that implements such an elimination will be called the absence-,
or GCP a-threshold (figure 8);
 A GCP will be included in the desired single-valued FC if it retains/preserves at least one GCP
in it (and, therefore, at least one “leafy” sub-GCP associated with the measured property). The
local (for the GCP) trust threshold for the source data that implements such an inclusion will
be referred to as the GCP presence- or p-threshold (figure 9).
        </p>
        <p>The NFC defuzzification will be completed when each GCP in the SMP will have its own value of
p-threshold. For the object gi  G* in the desired single-valued FC, only those BSP will be recognized
as true which are related to the measurable properties matched to the preserved “leafy” GCP.
b b
T = 1, 0
U = 0, 0
p+</p>
      </sec>
      <sec id="sec-3-4">
        <title>4.3.1. Detection of GCP a-thresholds</title>
        <p>At the first step of the correction cycle heuristically optimal a-threshold of each GCP is detected.</p>
        <p>For the GCP, the recursive identification of all its “leafy” subGCPs mapped to the measured
properties is implemented, and an actual set of truth vectors of the corresponding BSPs which are
saved as a result of standard NFC -section is generated.</p>
        <p>Of course, the actual set of GCP truth vectors may turn out to be empty (figure 10), and, therefore,
the considered GCP is excluded from the desired FC as a result of the standard -section of a NFC. In
this case, the identification of the optimal GCP a-threshold does not make sense, and some “disabling”
of the GCP p-threshold may be a sign of this GCP cut-off. Assigning to p-threshold abscissa a
negative value may serve as example of such disabling.</p>
        <p>The heuristically optimal GCP a-threshold can be detected only with a non-empty actual set of
GCP truth vectors, and, as it is not difficult to understand, the members of the southeast Pareto-front of
this set will serve as reference vectors for determining the optimal GCP a-threshold (figure 11). GCP
a-threshold itself should be searched (for example, by brute force) at the intersection of lines which
are parallel to the coordinate axes and passing through the reference vectors (see rhombs in figure 11):
 intersections of lines x = b+X and y = bY, respectively, of the first and second members of each
pair of neighboring truth vectors b+X, bX и b+Y, bY of the Pareto-front;
 the intersection of the x = b+N line of the “northern” truth vector b+N, bN of the Pareto-front
with the y =   line;
 the intersection of the y = bS line of the most “southern” – the truth vector b+S, bS of the</p>
        <p>Pareto-front with the x =  + line.</p>
        <p>An intersection that is “best” in terms of the proposed criterias is accepted as the heuristically
optimal GCP a-threshold. In the further analysis of the data, it is taken into account that indeed
optimal GCP a-threshold is more plausible, but it infinitely small differs from the heuristically optimal
one.</p>
      </sec>
      <sec id="sec-3-5">
        <title>4.3.2. Detection of GCP p-thresholds</title>
        <p>At the second (and final) step of the correction cycle, a heuristically optimal p-threshold of each GCP
is detected. The main work is performed by:
 a recursive procedure of local GCP correction (with the detection of its heuristically optimal
p-threshold). One of the procedure input parameters is the “current p-threshold”;
 a recursive procedure of GCP exclusion from the desired FC (with the disabling of its
pthreshold).</p>
        <p>b b
T = 1, 0</p>
        <p>+ a+
Figure 11. Determination of the optimal GCP
a-threshold based on the reference truth vectors</p>
        <p>and their “intersections” (the designation of
vectors and trurh regions is the same as in figures
8-10).</p>
        <p>The first procedure is sequentially launched for the “root” GCP with the current threshold equal to
. Recursively, possibly with reiteration of passes, it performs correction of the “root” GCP and all its
subGCP. The second procedure plays an auxiliary role in execution of the first one, but exactly at an
attempt to exclude the GCP ineradicable contradiction of the initial context and PEC can be found
(q.v. Subsection 4.2).</p>
        <p>Let’s explain these actions.</p>
        <p>In relation to any GCP, the trust threshold for the data β = β +, β  either excludes or retains it in
the desired FC.</p>
        <p>In the first case, GCP p-threshold is disabled (i.e., the GCP exclusion from the desired FC is fixed)
and, if the GCP is not “leafy”, p-thresholds of all embedded subGCPs of the considered GCP are
disabled.</p>
        <p>In the second case, if the given GCP is “leafy”, then the p-threshold is equal to β. Otherwise, the
execution of local PEC is checked at threshold β:
 first, all embedded sub-GCPs of the considered GCP are corrected recursively (with detection
of p-thresholds);
 secondly, according to the rules that depend on the type of a given GCP, its p-threshold is
revealed.</p>
        <p>Here are these rules:



</p>
        <p>GCP – MUC-group (see figure 5c). If at least one subGCP has a p-threshold disabled, then
pthreshold of the MUC-group and p-thresholds of all its subGCP are disabled. Otherwise, the
pthreshold of the MUC-group is set to β;
GCP – C-group or C-pair (see figure 5a or figure 6). If the conditioned subGCP is excluded,
then the p-thresholds of the C-group/C-pair and the conditioning subGCP are disabled.
Otherwise, the p-threshold of the C-group/C-pair is set to β;
GCP – I-group or I-pair (see figure 5 and figure 6b). All non-excluded subGCP are
incompatibility violators. From violators we select subGCP with a “best” (from the position of
the proposed criterias) a-threshold, which is assigned as new β. Correction of the considered
Igroup/I-pair is repeated. Reiterations continue as long as two or more non-excluded subGCPs
retain. As a result, the p-threshold of the I-group/I-pair will be either disabled or equated to the
current β.</p>
        <p>GCP – M-group (see figure 6). Members which violates conditionality and incompatibility
(i.e. certain subsubGCP) are selected from non-excluded subGCP-pairs. Then subsubGCP
with the “best” a-threshold is selected from them and this a-threshold is assigned as new β.
Correction of the considered M-group is repeated. Reiterations continue as long as there are
violators. As a result, the p-threshold of the M-group will be either disabled or equated to the
current β.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Conclusion</title>
      <p>
        The proposed heuristic method and the developed algorithm of defuzzification of the initial context
allows one to take into account the complex organization of the SMP of the studied KD in problems of
the FCA. The obtained result “closes” the main section of the hypothetical-deductive theory of
ontological data analysis developed by authors [
        <xref ref-type="bibr" rid="ref17 ref18 ref19 ref23 ref24 ref25">17-19, 23-25</xref>
        ].
      </p>
      <p>It is important to study the effectiveness of the developed algorithm depending on the parameters
characterizing the SMP of the studied KD and the initial non-strict context of FCA problem.</p>
      <p>The presented method and algorithm are focused on the unambiguous approximation of non-strict
formal contexts and the derivation of “crisp” concepts. A promising task is the development of an
appropriate method and algorithm, the end result of which is a system of “fuzzy” concepts.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Barsegyan</surname>
            <given-names>A A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kupriyanov</surname>
            <given-names>M S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holod</surname>
            <given-names>I I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tess</surname>
            <given-names>M D</given-names>
          </string-name>
          and
          <string-name>
            <surname>Elizarov S I 2009</surname>
          </string-name>
          <article-title>Data and Process Analysis (St. Petersburg: BHV-Petersburg)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Zagoruyko</surname>
            <given-names>N G</given-names>
          </string-name>
          <year>2013</year>
          <article-title>Cognitive data analysis (Novosibirsk: Sobolev Institute of Mathematics</article-title>
          , SB RAS)
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Ganter</surname>
            <given-names>B</given-names>
          </string-name>
          and
          <string-name>
            <surname>Wille R 1999 Formal Concept</surname>
          </string-name>
          <article-title>Analysis</article-title>
          .
          <source>Mathematical foundations (SpringerVerlag</source>
          Berlin-Heidelberg)
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Formal</given-names>
            <surname>Concept Analysis Homepage</surname>
          </string-name>
          <string-name>
            <surname>URL</surname>
          </string-name>
          : http://www.upriss.org.uk/fca/fca.html (
          <volume>15</volume>
          .
          <fpage>05</fpage>
          .
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Ganter</surname>
            <given-names>B</given-names>
          </string-name>
          and
          <string-name>
            <surname>Obiedkov S 2016 Conceptual Exploration</surname>
          </string-name>
          (Springer-Verlag Berlin Heidelberg)
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Ignatov</surname>
            <given-names>D I</given-names>
          </string-name>
          <year>2015</year>
          <article-title>Introduction to Formal Concept Analysis and Its Applications in Information Retrieval and Related Filds Information Retrieval</article-title>
          .
          <source>Revised Selected Papers 8th Russian Summer School</source>
          (Nizhniy Novgorod, Russia, Springer International Publishing)
          <volume>42</volume>
          -
          <fpage>141</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Carpineto</surname>
            <given-names>C</given-names>
          </string-name>
          and
          <string-name>
            <surname>Romano G 2004 Concept Data</surname>
          </string-name>
          <article-title>Analysis: Theory and Applications</article-title>
          (Wiley)
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Obitko</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Snasel</surname>
            <given-names>V</given-names>
          </string-name>
          and
          <string-name>
            <surname>Smid</surname>
            <given-names>J</given-names>
          </string-name>
          <source>2004 Proc. of the CLA 2004 International Workshop on Concept Lattices and their Applications</source>
          (Ostrava, Czech Republic)
          <fpage>111</fpage>
          -
          <lpage>119</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Smirnov</surname>
            <given-names>S V</given-names>
          </string-name>
          <year>2001</year>
          <article-title>Ontological analysis of modeling domain Bulletin of the Samara Scientific Center of RAS 3 62</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Godin</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mili</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mineau G W</surname>
            , Missaoui
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arfi</surname>
            <given-names>A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Chau T T 1998</surname>
          </string-name>
          <article-title>Ontology Design with Formal Concept Analysis Theory and Application of Object Systems (TAPOS) 4(2) 117</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Ganter</surname>
            <given-names>B</given-names>
          </string-name>
          and
          <string-name>
            <surname>Wille R 1989</surname>
          </string-name>
          <article-title>Conceptual scaling Applications of Combinatorics and Graph Theory to the Biological and</article-title>
          Social
          <string-name>
            <surname>Sciences</surname>
          </string-name>
          (New York Springer-Verlag)
          <fpage>139</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Wolff K E 1998 Conceptual</surname>
          </string-name>
          <article-title>Interpretation of Fuzzy Theory 6th European Congress on Intelligent Techniques and Soft Computing (Germany</article-title>
          , Aachen)
          <volume>1</volume>
          <fpage>555</fpage>
          -
          <lpage>562</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Zadeh</surname>
            <given-names>L A</given-names>
          </string-name>
          <year>1975</year>
          <article-title>The concept of a linguistic variable and its application to approximate reasoning Information Science 8 199 (Part I), 8 301 (Part II), 9 43 (Part III)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Belohlavek</surname>
            <given-names>R</given-names>
          </string-name>
          and
          <string-name>
            <surname>Konecny</surname>
            <given-names>J</given-names>
          </string-name>
          2007 Scaling, Granulation, and Fuzzy Attributes in
          <source>Formal Concept Analysis The IEEE International Conference on Fuzzy Systems (London) 918</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Yang</surname>
            <given-names>K M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            <given-names>E H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hwang S H and Choi S H 2008 Fuzzy Concept</surname>
          </string-name>
          <article-title>Mining based on Formal Concept Analysis Int</article-title>
          .
          <source>J. of Computers 2 279</source>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Pollandt</surname>
            <given-names>S 1996</given-names>
          </string-name>
          <string-name>
            <surname>Fuzzy-Begriffe</surname>
          </string-name>
          : Formale Begriffsanalyse unscharfer Daten (Springer-Verlag Berlin Heidelberg)
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Smirnov</surname>
            <given-names>S V</given-names>
          </string-name>
          <year>2007</year>
          <article-title>Fuzzy formal contexts in building of ontologies based on the formal concepts analysis: genesis and use Proc. All-Russian Conf. “Knowledge-Ontologies-Theories” (Novosibirsk</article-title>
          , Sobolev Institute of Mathematics, SB of RAS)
          <volume>2</volume>
          <fpage>17</fpage>
          -
          <lpage>25</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Smirnov</surname>
            <given-names>S V</given-names>
          </string-name>
          <year>2014</year>
          <article-title>Multi-valued and fuzzy logic in ontological data analysis</article-title>
          <source>Proc. 3rd Int. scientific conf. “Information technology and systems” (Publishing House of Chelyabinsk</source>
          State University)
          <fpage>90</fpage>
          -
          <lpage>91</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Semenova</surname>
            <given-names>V A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Smirnov S V 2016</surname>
          </string-name>
          <article-title>Intelligent analysis of incomplete data to building formal ontologies</article-title>
          <source>CEUR Workshop Proceedings</source>
          <volume>1638</volume>
          <fpage>796</fpage>
          -
          <lpage>805</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Arshinskii</surname>
            <given-names>L V</given-names>
          </string-name>
          <year>2007</year>
          <article-title>Substantial and formal deductions in logics with vector semantics Automation</article-title>
          and
          <source>Remote Control</source>
          <volume>68</volume>
          (
          <issue>1</issue>
          )
          <fpage>139</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Pronina</surname>
            <given-names>V A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Shipilina L B 2009</surname>
          </string-name>
          <article-title>Using relationships between attributes to build a domain ontology</article-title>
          <source>Control sciences 1 27</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Lammari</surname>
            <given-names>N</given-names>
          </string-name>
          and
          <string-name>
            <surname>Metais</surname>
            <given-names>E 2004</given-names>
          </string-name>
          <article-title>Building and maintaining ontologies: a set of algorithms Data</article-title>
          &amp;
          <source>Knowledge Engineering</source>
          <volume>48</volume>
          (
          <issue>2</issue>
          )
          <fpage>155</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Samoylov</surname>
            <given-names>D E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semenova</surname>
            <given-names>V A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Smirnov S V 2018</surname>
          </string-name>
          <article-title>Multilevel recursive model of properties existence constraints in machine learning</article-title>
          <source>Journal of Physics: Conf. Series 1096 012096</source>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Samoylov</surname>
            <given-names>D E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semenova</surname>
            <given-names>V A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Smirnov S V 2018</surname>
          </string-name>
          <article-title>The structure of measured properties system for objects of multidimensional observation and experiments Bulletin of the Samara</article-title>
          <source>State Technical University Series "Technical Sciences"</source>
          <volume>3</volume>
          (
          <issue>59</issue>
          )
          <fpage>56</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Ofitserov</surname>
            <given-names>V P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smirnov</surname>
            <given-names>V S</given-names>
          </string-name>
          and
          <string-name>
            <surname>Smirnov</surname>
            <given-names>S V</given-names>
          </string-name>
          <year>2014</year>
          <article-title>Method of the alpha-section of non-strict formal contexts in the formal concepts</article-title>
          analysis
          <source>Proc. of the 16th Int. Conf. Problems of Control and Modeling in Complex Systems (Samara: Samara Scientific Center of RAS) 228</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>