<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Bases in the Form of Predicate</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Karataiev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Sitnikov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Sharonova</string-name>
          <email>nvsharonova@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kharkiv National University of Radio Electronics</institution>
          ,
          <addr-line>Nauky ave, 14, Kharkiv, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University “Kharkiv Polytechnic Institute”</institution>
          ,
          <addr-line>Kyrpychova str., 2, Kharkiv, 61000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>Logical classification methods normally involve the compilation and solution of logical equations with variables that take values of 1 and 0, depending on whether the given object has a certain property or not. The solution of such equations makes it possible either to identify an object by the available sets of values of attribute variables, or to establish unknown properties of a given object. A natural generalization of the Boolean algebra equations is equations of the finite predicate algebra, which makes it possible to operate with arbitrary attribute variables defined on different finite sets. The use of such equations for constructing logical conclusions in knowledge bases allows expanding the capabilities of Boolean logical methods for object recognition and classification. When classifying objects, one deals with sets of features, selecting some values of which it is possible to identify whether the object under consideration belongs to a certain class. In this paper a method for investigating links between discrete object features is presented. Also, different types of predicate equations are considered. When analyzing links between salient data features, we often encounter quite complicated systems of logic equations that, nevertheless, can be simplified owing to their specific properties. A real-world considered to demonstrate the procedure of eliminating non-salient features. Knowledge representation, classification of discrete objects, feature selection, systems of COLINS-2023: 7th International Conference on Computational Linguistics and Intelligent Systems, April 20-21, 2023, Kharkiv, Ukraine</p>
      </abstract>
      <kwd-group>
        <kwd>Predicate</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>predicate equations, variables exclusion</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>Knowledge representation and interpretation plays an important part in various fields of computer
science. To formalize information about objects and processes in knowledge bases, various methods
of discrete mathematics are used. In cases where information about objects and processes, represented
by discrete information features, has a rather complex logical structure, various methods and models
of discrete mathematics, including logical equations with Boolean variables, are used for its formal
presentation.</p>
      <p>Logical classification methods normally involve the compilation and solution of logical equations
with variables that take values of 1 and 0, depending on whether the given object has a certain
property or not. The solution of such equations makes it possible either to identify an object by the
available sets of values of attribute variables, or to establish unknown properties of a given object. A
natural generalization of the Boolean algebra equations is equations of the finite predicate algebra,
which makes it possible to operate with arbitrary attribute variables defined on different finite sets.</p>
      <p>2023 Copyright for this paper by its authors.
The use of such equations for constructing logical conclusions in knowledge bases allows expanding
the capabilities of Boolean logical methods for object recognition and classification. When classifying
objects, one deals with sets of features, selecting some values of which it is possible to identify
whether or not the object under consideration belongs to a certain class. In this paper a method for
investigating links between discrete object features is presented. Also, different types of predicate
equations are considered. When analyzing links between salient data features, we often encounter
quite complicated systems of logic equations that, nevertheless, can be simplified owing to their
specific properties. Excluding extra variables with the help of the quantifiers leads to the
simplification of the original system of predicate equations. A real-world medical example has been
considered to demonstrate the procedure of eliminating non-salient features.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Related works</title>
      <p>
        Many practical problems lead to the necessity of using logic classification methods. For example,
in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] binary feature vectors are classified. The proposed method can be used in a variety of
classification problems in different industries. The process of classification is reduced to investigating
logical-dynamic systems depending on some initial states. In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] corrective functions for object
recognition logical methods are constructed. An interesting algorithm for logic classification with the
help of correcting functions has been proposed. In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] logical data classification has been used for the
analysis of hyperspectral data. Some combinatorial issues of logic classification have been
highlighted in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The authors have applied their research to Alzheimer’s Disease Proteomics
Expression classification. In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] logical algorithmic methods for building decision trees have been
considered. A logic-based classification method for text recognition has been proposed in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
logic machine learning approach has been suggested. The authors have developed a special logic
classifier. Logic-based design of a strong classifier with the help of weak classifiers has been
considered in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. A combination of various methods including logic classification has been tested in
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. A method for the classification of text messages based on logical extraction has been considered
in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] finite predicate networks have been investigated for radar detection. A new approach
to logic classification and recognition has been suggested in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Subsystems of Boolean equation
systems have been studied in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. A method for distributed solving logic equations has been
presented in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] some specific types of logic functions are considered. The focus if on
symmetric functions that are widely used for classification purposes. Entropy issues in Boolean
networks have been highlighted in [16]. Logic-predicate networks have been investigated in [17].
Using predicates for classifying access issues on the Internet of things has been considered in [18].
Many works devoted to classification often use Boolean algebra, fuzzy logic or neural networks as
main mathematical tools [19]. Logic approaches to fact-based analysis have been highlighted in [20].
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. Methodology for analyzing logic links between salient data features in systems of predicate equations</title>
      <p>A universal way to solve systems of equations of the algebra of finite predicates is to reduce the
predicate given by the system of equations and initial conditions to a perfect disjunctive normal form.
However, such a procedure involves enumeration of many intermediate solutions, and its practical
implementation requires a significant amount of computer time. For some types of predicate
equations, taking into account the peculiarities of their structure, it is possible to develop simpler
algorithms for solving them.</p>
      <p>In many practical tasks related to the semantic processing of medical data, natural language
information, customer data, there is no need to obtain all sets of values of semantic features, but it is
required to obtain one or more sets of values of features (target variables) that are of interest to the
user. It is often necessary to find the values of target variables under given initial conditions, which
are a fixed set of values of other features. When solving such problems, other variables that are not
included in the initial conditions and are not target variables are excluded from the equation by
linking them with existential quantifiers.</p>
      <p>Unlike Boolean variables, predicate variables provide more flexibility in discovering necessary
features. For example, let us consider the following dependencies:</p>
      <p>where domains for  and  1 are { 1,  2 ,  3} and { 1,  2 ,  3,  4,  5 ,  6} correspondingly. If  =  1,
then  1 =  1 or  1 =  2. On the other hand, it follows from the first expression, that
which means
  1 →  11 ∨  12,
¬( 11 ∨  12) → ¬  1,
 13 ∨  14 ∨  15 ∨  16 →   2 ∨   3.</p>
      <sec id="sec-4-1">
        <title>Thus, if  1 takes on a value from the set { 3,  4,  5 ,  6}, the object property  takes on values either  2 or  3.</title>
        <p>Finite predicates algebra gives us an opportunity to interpret knowledge in a strict mathematical
form, where different features and their values are connected with the help of Boolean and predicate
operations. The classical form of a logic equation with finite predicates is as follows:
where each variable takes on values from a finite set of elements, and in the general case these
domains can be different. In practice, we can encounter problems with many equations. In this case a
problem can be resolved by solving a system of equations:
 ( 1,  2 , … ,   ) = 1,
 1( 1,  2 , … ,   ) = 1,
 2( 1,  2 , … ,   ) = 1,</p>
        <p>…
  ( 1,  2 , … ,   ) = 1.</p>
        <p>If needed, this system can be rewritten as a conjunction of the above equations and represented in
the form of a single equation:</p>
        <p>1( 1,  2 , … ,   )⋀ 2( 1,  2 , … ,   )⋀ … ⋀  ( 1,  2 , … ,   ) = 1.</p>
        <p>For such equations we can define some problems that can be resolved:
1. Find all possible sets of variable values that satisfy these equations. This problem is
obviously difficult as there is exponential growth in calculations.
2. Determine whether the system has a solution
3. Determine whether it has a single solution
4. Find some important combinations of variable values that satisfy the system
5. Solve the system under some initial conditions.</p>
        <p>Consider the following system of predicate equations:
  
  1 →  1( 1,  2 , … ,   ),
  2 →  2( 1,  2 , … ,   ),</p>
        <p>…
→   ( 1,  2 , … ,   ).</p>
      </sec>
      <sec id="sec-4-2">
        <title>It means that when the feature  takes on a value   , a set of values for the variables  1,  2 , … ,</title>
        <p>should satisfy the equation
  ( 1,  2 , … ,   ) = 1,
(1)
which means that if an object possesses the property   then the features  1,  2 , … ,   should satisfy
the above equation.</p>
        <p>Generally speaking, the converse is not necessarily true. If   ( 1,  2 , … ,   ) = 1,  does not
necessarily take on the value   . Consider a stronger dependence:
  1 =  1( 1,  2 , … ,   ),
  2 =  2( 1,  2 , … ,   ),</p>
        <p>…
   =   ( 1,  2 , … ,   ).</p>
        <p>In this case any set of values of the features  1,  2 , … ,   either confirms the fact that  equals  
or not (belongs to the corresponding class or not). If the object has the property   , its features should
satisfy (1). Thus, we can classify the feature  by values of the features  1,  2 , … ,   . Also, it can be
easily shown that the conjunction of any two different functions   and   is equal to zero. It follows
from the basic properties of recognition predicates. It can be shown that the above system is
equivalent to the following equation:
  1 1( 1,  2 , … ,   ) ∨   2 2( 1,  2 , … ,   ) ∨ … ∨      ( 1,  2 , … ,   ) = 1.
(2)</p>
        <p>Logic methods for object classification are applied for solving practical problems from a variety of
fields: biology, physics, meteorology etc. Their specifics can be discovered at the stage of building a
mathematical model including data features. Normally propositional logic is used for this purpose.
We suggest an approach based on finite predicate algebra. Let us build a general form of such tasks
based on predicate equations.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Let feature variables  1,  2 , … ,   denote some properties of objects, for example, a disease like</title>
        <p>flue. Each variable takes on its values from its domain. Unlike Boolean variables, predicate variables
can take on values from different domains.</p>
      </sec>
      <sec id="sec-4-4">
        <title>Let discrete variables  1,  2 , … ,   be features by sets of which we can determine which values the</title>
        <p>property variables can take on. Properties and features can be connected in the form of some
complicated logic dependencies that can be represented as a predicate equation:</p>
        <p>( 1,  2 , … ,   ;  1,  2 , … ,   ) = 1, (3)
where P is a finite predicate.</p>
        <p>To classify an object under consideration means to determine based on this predicate equation and
experimental data on the features  1,  2 , … ,   , which properties (values of the features  1,  2 , … ,   )
this object possesses, and which properties are not satisfied. Each elementary conjunction, for
example,
 1 11 212…  1 ,
 1 21 222…  2 ,</p>
        <p>…
 1  1   2… 
 2
characterizes an object class. Then, based on the a priori dependence (3) and experimental data on the
features  1,  2 , … ,   , it is possible to determine to which class the given object belongs. As can be
seen from the above considerations, the values of features are grouped into a matrix.</p>
        <p>Suppose that as an experiment outcome we have obtained some data related to values of the
features  1,  2 , … ,   that describe the object being classified and composed the following predicate
equation describing links between them:</p>
        <p>(  1,  2 , … ,   ) = 1.</p>
        <p>The problem of object classification can be formalized as solving the following predicate
equation by finding an unknown predicate  :</p>
        <p>(  1,  2 , … ,   ) →  ( 1,  2 , … ,   ).</p>
      </sec>
      <sec id="sec-4-5">
        <title>By solving this functional equation, it is possible to determine feature values  1,  2 , … ,   that characterize the objects  1,  2 , … ,   .</title>
        <p>In studies related to logical inferences in knowledge bases, questions arise in determining the
tightness of the links between the features of these objects, as well as questions of their materiality
and insignificance. Apparently, we can consider the formal relationship between features to be
stronger, the fewer sets of values of these variables satisfy the equation. In this case, if any sets of
values of these variables satisfy the original equation, we can assume that there is no connection
between these variables.</p>
        <p>In addition, when solving practical problems, the following questions arise:
1. How will the specific values of this feature, substituted into the logical equation, affect the
links between the other features?
2. How strong is the logical relationship between two (or more) given features?</p>
        <p>To answer the first question, it seems natural to single out those predicates (and, accordingly,
equations) that, when a certain attribute value is substituted, are transformed into predicates that give
a stronger connection between variables, as well as such predicates, substitution into which this value
leads to a weakening of the logical connection between signs.</p>
        <p>To get an answer to the second question, it is necessary to exclude from the original equation with
the help of the existence or universal quantifier all variables except those under consideration and
study the resulting equation with a smaller number of variables, which describes all admissible sets of
values of the features under study.</p>
        <p>Let us consider the procedure of feature selection, where the number of features can be reduced.
Here we can encounter the following problems:</p>
        <p>We may need to find some sets of feature values that interest us where there is at least one value of
non-salient features such that there exists at least one set of values of salient features. In this case we
apply an existence quantifier to the set of non-salient values.</p>
        <p>We may need to find some sets of feature values, where for any set of non-salient features there
exists at least one solution of the equation. In this case we apply a universal quantifier to non-salient
variables.</p>
        <p>We may need to find some sets of feature values that satisfy the equation under the condition that
non-salient features take on some specific values.</p>
        <p>Let predicate P depend on the variables  ,  , … ,  . Define the substitution operator a(P) (a belongs
to the domain of the definition of the variable x ) acting on the predicate P as follows:
 ( ( ,  , … ,  ) =  ( ,  , … ,  ).</p>
        <p>Let’s call the substitution operator restrictive if the following condition is met</p>
        <p>( ,  , … ,  ) →  ( ,  , … ,  )
for all  ,  , … ,  .</p>
        <p>Call the subsitution operator distributive if the condition is met</p>
        <p>( ,  , … ,  ) ←  ( ,  , … ,  )
for all  ,  , … ,  .</p>
        <p>When interpreting knowledge represented by this implication, we can say that estrictive operators
reinforce the logical relationship between discrete features, distributing substitution operators weaken
this relationship, shifting the relationship between features in an arbitrary way.</p>
        <p>Consider the predicate P as follows:</p>
        <p>Then
Then
 ( ,  , … ,  ) =   1 1( , … ,  ) ∨   2 2( , … ,  ) ∨ …
∨      ( , … ,  ).
 1( ) =  1( , … ,  ) =   1 1( , … ,  ) ∨   2 1( , … ,  ) ∨ …
∨     1( , … ,  ).</p>
        <p>It is obvious that the predicate  1( ) will be contracting, if  1 →   ∀ = 1,2, … ,  .
The operator  1( ) will be distributing, if  1 ←   ∀ = 1,2, … ,  .</p>
      </sec>
      <sec id="sec-4-6">
        <title>Let us consider examples of the application of the operator  1 to the predicate  ( ,  ), where the</title>
        <p>variables  ,  and  have the domains { 1,  2}, { 1,  2} и { 1,  2} correspondingly.</p>
        <p>Let
 =   1  1  1 ∨   2  1  2 ∨   2  1  1.</p>
        <p>1( ) =   1  1 = (  1 ∨   2)&amp;  1  1 =
=   1  1  1 ∨   2  1  1.</p>
        <p>Except for the disjuncts that the predicate  1( ) contains  includes one more disjunct   2  1  1,
i.e. the operator  1 is a restricting one for the predicate  . According to the introduced definitions, in
the given example  1 =   1  1,  2 =   1  2 ∨   1 11 . It is obvious here that  1 →  2. Consider now
the predicate
 =   1  1  1 ∨   1  1  2 ∨   2  1  1,
 1( ) =   1  1 ∨   1  2 = (  1 ∨   2)&amp;
&amp;(  1  1 ∨   1  2) =   1 1 1 1 ∨   2  1  2 ∨</p>
        <p>∨   2  1  1 ∨    2 1  2.</p>
      </sec>
      <sec id="sec-4-7">
        <title>The  1operator for this predicate is obviously a distributing one. In this example</title>
        <p>1 =   1  1 ∨   1  2, and  2 =   1  2, i.e.  1 ←  2.</p>
        <p>In order to answer the second question, it is necessary to exclude from the original equation all
variables except those considered, and to investigate the resulting equation with fewer variables,
describing all valid feature value sets. The work [21] considers a fairly wide class of predicates for
which it is possible to specify an efficient algorithm for eliminating variables without increasing the
size of the original formula. We extend here this class by adding some additional properties. Consider
the following properties of the existence quantifier:
1. ∃   = 1.
2. ∃ ¬  = 1.
3. ∃ (¬( ( ) ( ))) = ∃ ¬ ( ) ∨ ∃ ¬ ( ).
4. ∃ ( ( ) ∨  ( )) = ∃ ( ) ∨ ∃ ( ).
5. ∃ ( ( )&amp; ( ) = ∃ ( )&amp; ( ).
6. ∃ ( ( ) →  ( )) =  ( ) → ∃ ( ).
7. ∃ ( ( ) →  ( )) =  ( ) → ∃ ( ).
8. Suppose   ( )&amp;  ( ) = 0,  ≠  ,  ,  = 1,2, … ,  , then:
∃ (( 1( ) →  1( ))&amp;( 2( ) →  2( ))&amp; …
&amp;(  ( ) →   ( ))) = ( 1( ) → ∃  1( ))&amp;
&amp;( 2( ) → ∃  2( ))&amp; … &amp;(  ( ) → ∃   ( )).
9. If the identity   ( ) ≡ 0 is not true for any  = 1,2, … ,  and   ( )&amp;  ( ) = 0 fo  ≠
 ,  ,  = 1,2, … ,  , then:
∃ (( 1( ) →  1( ))&amp;( 2( ) →  2( ))&amp; …
&amp;(  ( ) →   ( ))) =  1( ) ∨  2( ) ∨ … ∨   ( ).
the predicate
∀   = 0.</p>
        <p>∀ ¬  = 0.
then:
7. Suppose</p>
        <p>The properties listed above allow describing a broad class of finite predicates (correspondingly
equations) defined on the set of variables { , ,…, }, for which it is easy to find links between
selected variables without any increase in the size of the original formulas. Let us define such a class
recursively.
variable  ) belong to Δ .
2. All the negations ¬  ,¬  ,…,¬  belong to Δ .
3. If predicates ¬ ( ),¬ ( ) belong to Δ , then the predicate ¬( ( ) ( )) belong to Δ</p>
        <p>Any predicate not depending on the variable  , belongs to Δ .
5. If predicates  1 and  2 belong to Δ , then the predicate 
=  1 ∨  2 belongs to Δ .
6. If the predicate  1 belongs to Δ , and the predicate  2 does not depend on  , then the
predicate</p>
        <p>=  1&amp; 2 belongs to Δ .
predicate</p>
        <p>=  1 →  2 belongs to Δ .</p>
        <p>predicates  1, 2,…,  belong to Δ ; then
7. If the predicate  1 does not depend on  , and the predicate  2 belongs to Δ , then the
8. Let predicates  1, 2,…,</p>
        <p>do not depend on  ;   &amp;  = 0 for  ≠  , , = 1,2,…, ,</p>
        <p>= ( 1 →  1)&amp;( 2 →  2)&amp;…&amp;(  →   )
belongs to Δ .
9. If the predicates  1, 2,…,  depend only on  ,   &amp;  = 0 for  ≠  , , = 1,2,…, ; for any
 = 1,2,…, the identity   ≡ 0 is not true; predicates  1, 2,…,  do not depend on  ; then
 = ( 1 →  1)&amp;( 2 →  2)&amp;…&amp;(  →   )
belongs to Δ .</p>
        <p>One may need also to exclude extra variables with the help of the universal quantifier. In this case
we can use the following properties of this quantifier:
∀ ¬( ( )∨  ( )) = ∀ ¬ ( )&amp;∀ ¬ ( )
∀ ( ( )&amp; ( )) = ∀
∀ ( ( )∨  ( ) = ∀
( )&amp;∀
( )∨  ( ).</p>
        <p>( ).
∀ ( ( )&amp; ( )) =  ( )&amp;∀</p>
        <p>( ).
8. If the identity   ( ) ≡ 0 is not true for any  = 1,2,…, and   ( )&amp;  ( ) = 0 for  ≠
 , = 1,2,…, , then:</p>
        <p>( )&amp;  ( ) = 0,  ≠  , , = 1,2,…, ,
∀ (( 1( )&amp; 1( ))∨ ( 2( )&amp; 2( ))∨ …
∨ (  ( )&amp;  ( ))) = ( 1( )&amp;∀  1( ))∨
∨ ( 2( )&amp;∀  2( ))∨ …∨ (  ( )&amp;∀   ( )).
∀ (( 1( )&amp; 1( ))∨ ( 2( )&amp; 2( ))∨ …
∨ (  ( )&amp;  ( ))) =  1( )&amp; 2( )&amp;…&amp;  ( ).
without an increase in the size of the formula:
We can recursively define a class of predicates Σ from which it is possible to exclude the variable 
1. All the “recognitions”   ,  ,…,  belong to Σ .
2. All the negations ¬  ,¬  ,…,¬  that do not depend on  belong to Σ .
3. If ¬ 1 and ¬ 2 belong to Σ , then ¬( 1 ∨  2) belongs to Σ .
4. If predicates  1 and  2 belong to Σ , then the predicate  =  1&amp; 2 belongs to Σ .
belongs to Σ .
6. If a predicate  1 does not depend on  , and a predicate  2 belongs to Σ , the predicate  =
 1&amp; 2 belongs to Σ .
7. Suppose predicates  1,  2, … ,   do not depend on  ,   &amp;  = 0 for  ≠  ,  ,  = 1,2, … ,  ;
belongs to Σ .
8. If predicates  1,  2, … ,   depend only on  ,   &amp;  = 0 for  ≠  ,  ,  = 1,2, … ,  ; for any  =
1,2, … ,  the identity   ≡ 0 is not true, predicates  1,  2, … ,   do not depend on  , then the
predicate  = ( 1&amp; 1)∨ ( 2&amp; 2)∨ … ∨ (  &amp;  ) belongs to Σ .</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Experiment and results</title>
      <p>Let us consider a medical example and investigate links between features. The predicate variables
are interconnected with systems of logic equations. Solving these equations allows attributing the
objects under consideration to a certain class, which characterizes determining the risk group of a
patient related to some diseases.</p>
      <p>The plan of the experiment is as follows. We use real-world medical data and code them with the
help of predicate equations. We note that although some variables can take on values “unknown”, this
is nevertheless a case of the closed world as “unknown” just means a value from the alphabet on
which a variable is defined. Thus, every domain for any variable is closed. After we have written a
system of equations with the help of experts, we start deleting variables that we consider non-salient
at the moment. It does not mean that in other cased other variables will be considered as non-salient.
Salient variables are those for which we want to determine logic links As an output, we obtain an
equation where non-salient variables are deleted. The resulting equation is simpler than the original
system, and it is possible to analyze links between salient variables in a simpler way.</p>
      <p>If we consider the information screening of medical data for assessing the development and
prevention of heart and vessel diseases [22], we can select a set of features for formalizing screening
procedures. Let us consider the following features and their values:</p>
      <p>Gender:  1 = { 11,  12}, where  11 means a woman,  11 means a man.</p>
      <p>Age:  2 = { 21,  22,  23}, where  21 is less than 40 years,  22 is from 40 to 50 years,  23 is greater
than 50 years.</p>
      <p>Diabetes mellitus:  3 = { 31,  32,  33,  34}, where  31 – yes,  32 – no (actual diagnosis),  33 – no (not
actual diagnosis),  34 – unknown.</p>
      <p>Arterial hypertension:  4 = { 41,  42,  43,  44}, where  41 – yes,  42 – no (actual diagnosis),  43 – no
(not actual diagnosis),  44 – unknown.</p>
      <p>Kidney problems:  5 = { 51,  52,  53}, where  51 – yes,  52 – no,  53 – unknown.
to the corresponding medical technological documentation (unified clinical protocol and local
protocols related to the prevention of heart and vessel diseases.</p>
      <p>For example, for forming the feature  2, the following system of predicate equations can be
 21 =  72 82 ( 92 ∨  93( 120 ∨  130)) ∨  72 83 92 120 ∨  73 82 120( 92 ∨  93)
 22 =  72 ( 81( 91 120 ∨  92)∨  93( 81 120 ∨  82 110)) ∨ ( 72( 82 91 ∨  83 92)∨ ( 72 93 ∨  73 91) 83 120 ∨
∨ ( 72 83 ∨  73 82) 91( 120 ∨  130)∨  73 82( 92 ∨  93)) ( 110 ∨  130)∨  73 81( 92 120 ∨  93)∨
 23 =  71 120 ( 81 92 ∨  82( 91 ∨  92)) ∨ ( 71 93( 81 ∨  82)∨ ( 71 83 ∨  73 81) 91)( 120 ∨  130)∨
∨  71 83( 92 ∨  93)∨ ( 72( 81( 91 ∨  93)∨  83 93)∨ ( 72 83 ∨  73 82) 91 110 ∨
∨  73( 81 92 ∨  83 91)) ( 110 ∨  130)∨  73 83( 92 130 ∨  93),
{  24 =  71 93 110( 81 ∨  82)∨ ( 71 83 ∨  73 81) 91 110 ∨ ( 71 82 91 ∨  71 92( 81 ∨  82)) ( 110 ∨  130)∨  71 81 91.</p>
      <p>The final classification can be expressed by the following system:
 1 =  11 21( 31 ∨  32)∨ ( 11 22 ∨ ( 12 ∨  13) 21) 31,
 2 =  11( 21 33 ∨  22 32)∨ ( 11( 23 ∨  24)∨  12( 22 ∨  23)∨  13 22 ∨  14( 21 ∨  22)) ( 31 ∨  32)∨
∨ ( 12 ∨  13) 21( 32 ∨  33)∨ ( 12 24 ∨ ( 13 ∨  14) 23) 31,
∨ ( 11 24 ∨  14( 21 ∨  22))  33 ∨ ( 12 24 ∨  14 23)( 32 ∨  33),
 3 =  21 34 ∨ ( 11 ∨  12 ∨  13)( 22 ∨  23)( 33 ∨  34)∨  13 32( 23 ∨  24)∨ ( 13 ∨  14) 24 31 ∨
{  4 = ( 11 ∨  12) 24 34 ∨  13 24( 33 ∨  34)∨  14 34( 22 ∨  23)∨  14 24( 32 ∨  33 ∨  34)
system of predicate equations in the following form (2):</p>
      <p>Let us investigate logic links between discrete features  1 –  10. First of all, let us rewrite the
 ( 2,  1, … ,  10) =  21( 72 82 ( 92 ∨  93( 120 ∨  130)) ∨  72 83 92 120 ∨  73 82 120( 92 ∨  93))∨
∨  22( 72 ( 81( 91 120 ∨  92)∨  93( 81 120 ∨  82 110)) ∨ ( 72( 82 91 ∨  83 92)∨ ( 72 93 ∨  73 91) 83 120 ∨
∨ ( 72 83 ∨  73 82) 91( 120 ∨  130)∨  73 82( 92 ∨  93)) ( 110 ∨  130)∨  73 81( 92 120 ∨  93)∨
∨  73 83 92( 110 ∨  120))∨
∨  23( 71 120 ( 81 92 ∨  82( 91 ∨  92)) ∨ ( 71 93( 81 ∨  82)∨ ( 71 83 ∨  73 81) 91)( 120 ∨  130)∨
∨  71 83( 92 ∨  93)∨ ( 72( 81( 91 ∨  93)∨  83 93)∨ ( 72 83 ∨  73 82) 91 110 ∨</p>
      <p>∨  73( 81 92 ∨  83 91)) ( 110 ∨  130)∨  73 83( 92 130 ∨  93))∨
∨  24( 71 93 110( 81 ∨  82)∨ ( 71 83 ∨  73 81) 91 110 ∨ ( 71 82 91 ∨  71 92( 81 ∨  82)) ( 110 ∨  130)∨
 71 81 91) = 1.
 6,  8,  9,  10:</p>
      <p>It can be seen that this predicate belongs to the class Δ 7. Let us investigate the link between all
variables except  7. This elimination will give us the link between the variables  2,  1, …,
 = ∃ 7 ( 2,  1, … ,  10) =
=  21( 82 ( 92 ∨  93( 120 ∨  130)) ∨  83 92 120 ∨  82 120( 92 ∨  93))∨
∨  22 ( 81( 91 120 ∨  92)∨  93( 81 120 ∨  82 110)) ∨ (( 82 91 ∨  83 92)∨ ( 93 ∨  91) 83 120 ∨
∨ ( 83 ∨  82) 91( 120 ∨  130)∨  82( 92 ∨  93)) ( 110 ∨  130)∨  81( 92 120 ∨  93)∨</p>
      <p>∨  83 92( 110 ∨  120))∨
∨  23( 120 ( 81 92 ∨  82( 91 ∨  92)) ∨ ( 93( 81 ∨  82)∨ ( 83 ∨  73 81) 91)( 120 ∨  130)∨
∨  83( 92 ∨  93)∨ (( 81( 91 ∨  93)∨  83 93)∨ ( 83 ∨  82) 91 110 ∨</p>
      <p>∨ ( 81 92 ∨  83 91)) ( 110 ∨  130)∨  83( 92 130 ∨  93))∨
∨  24( 93 110( 81 ∨  82)∨ ( 83 ∨  81) 91 110 ∨ ( 82 91 ∨  92( 81 ∨  82)) ( 110 ∨  130)∨  81 91) = 1.</p>
      <p>It should be noted that the size of the original formula has not increased, which is because the
predicate  ( 2,  1, … ,  10) belongs to Δ 7 .</p>
      <p>Suppose we are interested in the link between  2,  9,  10. Let us eliminate the other features from
the predicate  ( 1, … ,  10):
 ( 2,  9,  10) = ∃ 1∃ 2∃ 3∃ 4∃ 5∃ 6∃ 7∃ 8 ( 2,  1, … ,  10) =</p>
      <p>=  21(( 92 ∨  93( 120 ∨  130)) ∨  92 120 ∨  120( 92 ∨  93))∨
∨  22 (( 91 120 ∨  92)∨  93( 120 ∨  110)) ∨ (( 91 ∨  92)∨ ( 93 ∨  91) 120 ∨
∨  91( 120 ∨  130)∨ ( 92 ∨  93)) ( 110 ∨  130)∨ ( 92 120 ∨  93)∨</p>
      <p>Again, we have reduced the original formula and obtained a simpler dependence between selected
medical features. After the necessary dependence is obtained, we can solve the resulting equation with
one or several target variables.</p>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusions and further research</title>
      <p>In this paper finite predicate equations of different types have been considered. The description of
classification problems based on predicate equations have been presented. The problem of object
classification on the basis of features taking on discrete values has been described mathematically as a
solution of predicate equations. A broad class of predicates from which it is possible to delete extra
variables and focus on links between salient variables has been described. A method for deleting
nonsalient variables by the application of the existential quantifier has been suggested and demonstrated
on a real-world medical example.</p>
      <p>Although some variables in the medical example can take on values “unknown”, we deal with the
closed world here as “unknown” means just an element from the domain for the variable. All the
domains are strictly defined and cannot be completed with any other elements. The main advantage of
this method based on a specific structure of predicate systems lies in the fact that after deleting
nonsalient variables the original system (or equation) is simplified, which is due to special properties of
quantifiers. Salient variables are not necessarily fixed forever. It is up to researcher to decide what
logic connections are important at the moment.</p>
      <p>As a further research direction, we are going to extend classes of predicates from which it is easy
to delete non-salient variables Such classes are much more complicated than relational structures, but
many practical problems require a corresponding knowledge representation and analysis.</p>
    </sec>
    <sec id="sec-7">
      <title>6. References</title>
      <p>[16] L. Gong, J. Zhang, L. Sang, H. Liu and Y. Wang, "The Unpredictability Analysis of Boolean
Chaos," in IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 67, no. 10, pp.
18541858, Oct. 2020, doi: 10.1109/TCSII.2019.2949571.
[17] T. Kosovskaya, "Implementation of Formula Partial Sequence for Rough Solution of AI
Problems in the Framework of the Logic-Predicate Approach," 2019 Computer Science and
Information Technologies (CSIT), Yerevan, Armenia, 2019, pp. 65-68, doi:
10.1109/CSITechnol.2019.8895153.
[18] Y. -F. Tseng and S. -J. Gao, "Efficient Subset Predicate Encryption for Internet of Things," 2021
IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, Fukushima, Japan,
2021, pp. 1-2, doi: 10.1109/DSC49826.2021.9346245.
[19] K. Smelyakov, A. Chupryna, O. Bohomolov and N. Hunko, "The Neural Network Models
Effectiveness for Face Detection and Face Recognition," 2021 IEEE Open Conference of Electrical,
Electronic and Information Sciences (eStream), 2021, pp. 1-7, doi:
10.1109/eStream53087.2021.9431476.
[20] Sharonova N. Issues of Fact-based Information Analysis [Electronic resource] / N. Sharonova, A.
Doroshenko, O. Cherednichenko // Computational linguistics and intelligent systems (COLINS 2018)
: proc. of the 2nd Intern. Conf., June 25-27, 2018. Vol. 1: Main Conference / ed.: V. Lytvyn [et al.]. –
Electron. text data. – Lviv, 2018. – P. 11-19. – URL: http://ceur-ws.org/Vol-2136/10000011.pdf,
(accessed 01.06.2020).
[21] D.E.Sitnikov, B D’Cruz, P.E. Sitnikova, “Discovering salient data features by composing and
manipulating logical equations”, Data Mining II, WIT Press, 2000, 241-248.
[22] Melnik K. Towards medical screening information technology: the healthgrid-based approach /
K. Melnik, O. Cherednichenko, V. Glushko // Information Systems: Methods, Models, and
Applications. – Heidelberg : Springer, 2013. – P. 202-204.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. All “recognitions”   ,  ,…,  ( , ,…,
          <article-title>− symbols belonging to the domain for the 5</article-title>
          .
          <article-title>If a  1 belongs to Σ , and a predicate  2 do not depend on  , then the predicate</article-title>
          =  1 ∨  2 [1]
          <string-name>
            <given-names>G. A.</given-names>
            <surname>Oparin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. G.</given-names>
            <surname>Bogdanova</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Pashinin</surname>
          </string-name>
          ,
          <article-title>"Classification in Binary Feature Space Using Logical Dynamic Models," 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija</article-title>
          , Croatia,
          <year>2021</year>
          , pp.
          <fpage>1020</fpage>
          -
          <lpage>1025</lpage>
          , doi: 10.23919/MIPRO52101.
          <year>2021</year>
          .
          <volume>9596697</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kabulov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Urunboev</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Saymanov</surname>
          </string-name>
          ,
          <article-title>"Object recognition method based on logical correcting functions,"</article-title>
          <source>2020 International Conference on Information Science and Communications Technologies (ICISCT)</source>
          , Tashkent, Uzbekistan,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/ICISCT50599.
          <year>2020</year>
          .
          <volume>9351473</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Ibrahim</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Yacout</surname>
          </string-name>
          ,
          <article-title>"Hyperspectral Image Classification Based on Logical Analysis of Data," 2019 IEEE Aerospace Conference</article-title>
          , Big Sky,
          <string-name>
            <surname>MT</surname>
          </string-name>
          , USA,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          , doi: 10.1109/AERO.
          <year>2019</year>
          .
          <volume>8742023</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Noh</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. S.</given-names>
            <surname>Ryoo</surname>
          </string-name>
          ,
          <article-title>"Identifying Combinatorial Significance for Classification of Alzheimer's Disease Proteomics Expression with Logical Analysis of Data,"</article-title>
          <source>2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)</source>
          , Houston, TX, USA,
          <year>2021</year>
          , pp.
          <fpage>1661</fpage>
          -
          <lpage>1663</lpage>
          , doi: 10.1109/BIBM52615.
          <year>2021</year>
          .
          <volume>9669835</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>I.</given-names>
            <surname>Povkhan</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Lupei</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>The Algorithmic Classification Trees," 2020 IEEE Third International Conference on Data Stream Mining &amp; Processing (DSMP)</source>
          , Lviv, Ukraine,
          <year>2020</year>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>43</lpage>
          , doi: 10.1109/DSMP47368.
          <year>2020</year>
          .
          <volume>9204198</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Tamilselvi</surname>
          </string-name>
          , G. Ramkumar, G. Anitha,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nirmala</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Ramesh</surname>
          </string-name>
          ,
          <article-title>"A Novel Text Recognition Scheme using Classification Assisted Digital Image Processing Strategy,"</article-title>
          <source>2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)</source>
          , Chennai, India,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/ACCAI53970.
          <year>2022</year>
          .
          <volume>9752542</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Wagle</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Kovalerchuk</surname>
          </string-name>
          ,
          <article-title>"Interactive Visual Self-service Data Classification Approach to Democratize Machine Learning," 2020 24th International Conference Information Visualisation (IV), Melbourne</article-title>
          , Australia,
          <year>2020</year>
          , pp.
          <fpage>280</fpage>
          -
          <lpage>285</lpage>
          , doi: 10.1109/IV51561.
          <year>2020</year>
          .
          <volume>00052</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Jean-Marc</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Lafitte</surname>
          </string-name>
          ,
          <article-title>"Combining weak classifiers: a logical analysis," 2021 23rd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), Timisoara</article-title>
          , Romania,
          <year>2021</year>
          , pp.
          <fpage>178</fpage>
          -
          <lpage>181</lpage>
          , doi: 10.1109/SYNASC54541.
          <year>2021</year>
          .
          <volume>00038</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhou</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gai</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Research on Pulsar Classification Based on Machine Learning," 2020 3rd International Conference on Intelligent Autonomous Systems (ICoIAS)</source>
          , Singapore,
          <year>2020</year>
          , pp.
          <fpage>14</fpage>
          -
          <lpage>18</lpage>
          , doi: 10.1109/ICoIAS49312.
          <year>2020</year>
          .
          <volume>9081836</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Nwankwo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wimmer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Chen</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <article-title>"Text Classification of Digital Forensic Data,"</article-title>
          <year>2020</year>
          11th
          <string-name>
            <given-names>IEEE</given-names>
            <surname>Annual Information</surname>
          </string-name>
          <string-name>
            <surname>Technology</surname>
          </string-name>
          ,
          <source>Electronics and Mobile Communication Conference (IEMCON)</source>
          , Vancouver, BC, Canada,
          <year>2020</year>
          , pp.
          <fpage>0661</fpage>
          -
          <lpage>0667</lpage>
          , doi: 10.1109/IEMCON51383.
          <year>2020</year>
          .
          <volume>9284913</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I.</given-names>
            <surname>Shubin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Snisar</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Litvin</surname>
          </string-name>
          ,
          <article-title>"Categorical Analysis of Logical Networks in Application to Intelligent Radar Systems,"</article-title>
          2020 IEEE International Conference on Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine,
          <year>2020</year>
          , pp.
          <fpage>235</fpage>
          -
          <lpage>238</lpage>
          , doi: 10.1109/PICST51311.
          <year>2020</year>
          .
          <volume>9467893</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Cenzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Marek</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. B.</given-names>
            <surname>Remmel</surname>
          </string-name>
          ,
          <article-title>"On the complexity of index sets for finite predicate logic programs which allow function symbols,"</article-title>
          <source>in Journal of Logic and Computation</source>
          , vol.
          <volume>30</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>107</fpage>
          -
          <lpage>156</lpage>
          , Jan.
          <year>2020</year>
          , doi: 10.1093/logcom/exaa005.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kabulov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Urunbayev</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Ashurov</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Logic Method of Finding Maximum Joint Subsystems of Systems of Boolean Equations," 2020 International Conference on Information Science and Communications Technologies (ICISCT)</source>
          , Tashkent, Uzbekistan,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/ICISCT50599.
          <year>2020</year>
          .
          <volume>9351394</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H.</given-names>
            <surname>Qi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. -J.</given-names>
            <surname>Jing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Proutiere</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <article-title>"Distributedly Solving Boolean Equations over Networks," 2020 59th IEEE Conference on Decision and Control (CDC), Jeju</article-title>
          , Korea (South),
          <year>2020</year>
          , pp.
          <fpage>560</fpage>
          -
          <lpage>565</lpage>
          , doi: 10.1109/CDC42340.
          <year>2020</year>
          .
          <volume>9304144</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>F. N.</given-names>
            <surname>Castro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. E.</given-names>
            <surname>González</surname>
          </string-name>
          and
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Medina</surname>
          </string-name>
          ,
          <article-title>"Diophantine Equations With Binomial Coefficients and Perturbations of Symmetric Boolean Functions,"</article-title>
          <source>in IEEE Transactions on Information Theory</source>
          , vol.
          <volume>64</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>1347</fpage>
          -
          <lpage>1360</lpage>
          , Feb.
          <year>2018</year>
          , doi: 10.1109/TIT.
          <year>2017</year>
          .
          <volume>2750674</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>