<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Making Axiom Weakening Work in  ℛℐ</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roland Bernard</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oliver Kutz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nicolas Troquard</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Free University of Bozen-Bolzano</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Axiom weakening is a technique that allows for a fine-grained repair of inconsistent ontologies. Its main advantage is that it repairs ontologies by making axioms less restrictive rather than by deleting them, employing refinement operators. In this paper, we build on previously introduced axiom weakening for ℒ, and show how it can be extended to deal with ℛℐ, the expressive and decidable description logic underlying OWL 2 DL. The main problem here is to ensure that the regularity conditions of ℛℐ are preserved in the weakening process, as not every weaker axiom can be inserted into an ontology without compromising regularity. We present a basic regularity-preserving weakening approach for ℛℐ, describe briefly a prototype implementation realising it as well as an accompanying Protégé plugin, and perform and discuss basic evaluations of the approach.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Description Logic</kwd>
        <kwd>Knowledge Refinement</kwd>
        <kwd>Axiom Weakening</kwd>
        <kwd>Ontology Debugging</kwd>
        <kwd>ℛℐ</kwd>
        <kwd>Protégé</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Many approaches to repairing inconsistent ontologies amount to identifying problematic axioms
and then removing them (e.g., [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1, 2, 3, 4</xref>
        ]). Whilst this approach is obviously suficient to
guarantee that the obtained ontology is consistent, it tends to lead to information loss as a
secondary efect, as we outlined in detail in previous work [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ], where also a more extensive
discussion of related work can be consulted. Further, this information loss can be reduced by
weakening the inferential power of an axiom rather than by deleting it [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8 ref9">7, 8, 9, 5, 6</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
axiom weakening using refinement operators has been described for ℒ and experimentally
evaluated, showing that axiom weakening is able to retain more information than deletion.
In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the axiom weakening has been extended to include many aspects of ℛℐ, notably
omitting, however, the weakening of RBox axioms. The authors of [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] further show that the
proposed repair by iterated weakening almost surely terminates.
      </p>
      <p>
        In this paper, we extend the previous work on axiom weakening in DLs by extending the
underlying basic principles to the logic ℛℐ, including also the weakening of RIAs. We
discuss a number of scenarios where weakening can impact regularity of ℛℐ RBoxes,
and provide a framework where this is avoided. Additionally, by implementing the proposed
refinement and weakening operators we are able to perform experimental evaluation, also on
ontologies using the more expressive features of ℛℐ. The results reafirm the results of
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] for the case of ℛℐ, namely that weakening may significantly outperform deletion.
      </p>
      <sec id="sec-1-1">
        <title>2. Axiom Weakening for  ℛℐ</title>
        <p>
          We first give a brief description of the DL ℛℐ; for full details, see [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11, 12</xref>
          ].
2.1. Defining ℛℐ
The syntax of ℛℐ is based on a vocabulary of three disjoint sets  , ,  of,
respectively, concept names, role names, and individual names. The sets of, respectively, ℛℐ roles
and ℛℐ concepts are generated by the following grammar.
        </p>
        <p>,  ::=  |  | − ,
 ::= ⊥ | ⊤ |  | ¬ |  ⊓  |  ⊔  | ∀. | ∃. |</p>
        <p>≥  . |≤  . | ∃.Self | {} ,
where  ∈  is a concept name,  ∈  is a role name,  ∈  is an individual name and
 ∈ N0 is a non-negative integer.  is the universal role.  is a simple role in the RBox ℛ (see
below). In the following, ℒ( , ,  ) and ℒ() =  ∪ { } ∪ {− |  ∈ } denote,
respectively, the set of concepts and roles that can be built over  , , and  in ℛℐ.</p>
        <p>We next define the notions of TBox, ABox, and (regular) RBox, of complex role inclusions,
and of (non-)simple roles: A TBox  is a finite set of concept inclusions (GCIs) of the form
 ⊑  where  and  are concepts. The TBox is used to store terminological knowledge
concerning the relationship between concepts. An ABox  is a finite set of statements of the
form (), (, ), ¬(, ),  = , and  ̸= , where  is a concept,  is a role and  and
 are individual names. The ABox expresses knowledge regarding individuals in the domain.
An RBox ℛ is a finite set of role inclusions (RIAs) of the form 1 ∘ · · · ∘  ⊑ , and disjoint
role axioms disjoint (1, 2) where , 1, . . . , , 1, and 2 are roles. 1 and 2 are simple
(defined next) in the RBox ℛ. The special case of  = 1 is a simple role inclusion, while we
call the cases where  &gt; 1 complex role inclusions. The RBox represents knowledge about the
relationships between roles.</p>
        <p>The set of non-simple roles in ℛ is the smallest set such that:  is non-simple; any role 
that appears as the super role of a complex RIA 1 ∘ · · · ∘  ⊑  where  &gt; 1 is non-simple;
any role  that appears on the right-hand side of a simple RIA  ⊑  where  is non-simple,
is also non-simple; and a role  is non-simple if and only if − is non-simple. All other roles are
simple.</p>
        <p>For convenience, let us define the function inv () such that inv () = − and inv (− ) = 
for all role names  ∈ . An RBox ℛ is regular if there exists a preorder ⪯ , i.e., a transitive
and reflexive relation over the set of roles appearing in ℛ such that,  ⪯  ⇐⇒ inv () ⪯ ,
and all RIAs in ℛ are of the forms: inv () ⊑ ,  ∘  ⊑ ,  ⊑ ,  ∘ 1 ∘ · · · ∘  ⊑ ,
1 ∘ · · · ∘  ∘  ⊑ , or 1 ∘ · · · ∘  ⊑ , where  &gt; 1 and , , 1, · · · ,  are roles such
that  ⪯ ,  ⪯ , and  ̸⪯  for  = 1, . . . , . This regularity restriction has been chosen
to align with the implementation of the OWL 2 DL [13] profile checker in the OWL API [14].
Definition 1. A ℛℐ ontology  =  ∪  ∪ ℛ consists of a TBox  , an ABox , and a
RBox ℛ in the language of ℛℐ, and where the RBox ℛ is regular.</p>
        <p>
          The semantics of ℛℐ is defined using interpretations  = ⟨∆  , ·  ⟩, where ∆  is a
nonempty domain and ·  is a function associating to each individual name  an element of the
domain  ∈ ∆  , to each concept  a subset of the domain  ⊆ ∆  , and to each role  a
binary relation on the domain  ⊆ ∆  × ∆  ; see [
          <xref ref-type="bibr" rid="ref10">12, 10</xref>
          ] for further details. An interpretation
 is a model for  if it satisfies all the axioms in .
        </p>
        <p>Given two concepts  and  we say that  is subsumed by  (or  subsumes ) with respect
to the ontology , written  ⊑ , if  ⊆  in every model  of . Further,  is strictly
subsumed by , written  ⊏ , if  ⊑  but not  ⊑ . Analogously, given two roles
 and ,  is subsumed by  with respect to  ( ⊑ ) if  ⊑  in all models  of .
Again,  ⊏  holds if  ⊑  but not  ⊑ .</p>
        <sec id="sec-1-1-1">
          <title>2.2. Weakening, reference ontologies, covers, refinement operator</title>
          <p>
            The case of ℒ. Axiom weakening, as discussed in [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ], is based on refinement operators.
Two types of refinement operators are used, a specialization operator and a generalization
operator. They return for a given concept a set of, respectively, more specific or more general
concepts. In [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ] the proposed refinement operator is based on upward and downward cover
sets. The upward or downward cover for a concept is the set of, respectively, the most specific
generalization or most general specializations from the set of subconcepts. Given an inconsistent
ontology  =  ∪  ∪ ℛ, to be able to compute a non-trivial upcover and downcover, we first
need to find a consistent subontology ref of  to serve as reference ontology. One approach
is to pick a random maximal consistent subset of  and choose it as reference ontology ref;
another is to choose the intersection of all maximal consistent subsets of  (e.g., [15]).
          </p>
          <p>Once a reference ontology ref has been chosen, and as long as  is inconsistent, we select a
“bad axiom” and replace it with a random weakening of it with respect to ref. We can randomly
sample a number of (or all the) minimally inconsistent subsets of axioms 1, 2, . . .  ⊆ 
and return one axiom in  ∪  from the ones occurring the most often. Weakening of GCIs
is performed by either using the specialization operator to refine the left-hand side or the
generalization operator for the right-hand side. For class assertions, the concept is refined using
the generalization operator.</p>
          <p>The case of ℛℐ. The main dificulties that arise when weakening axioms in ℛℐ
ontologies, and especially when weakening RIAs, are related to ensuring that the constraints
on the use of non-simple roles and the regularity of the RBox as a whole are maintained. Not
every weaker axiom can be inserted into a valid ℛℐ ontology without causing a violation
of these restrictions, as shown in the next example.</p>
          <p>Example 1. Take the ontology  = { ∘  ∘  ⊑ ,  ⊑ , ⊤ ⊑ ∀.⊥, ∃.Self ⊑ ⊤}. Since  is
empty in every model of this ontology, the axiom  ⊑  could be weakened to  ⊑  if we ignore
the additional constraints. This would result in an ontology where  is non-simple, which is not
allowed since  is used as part of a self constraint. Additionally, using this weakening would also
cause a non-regular RBox, because for any preorder ⪯ ,  ̸⪯  must hold for the complex RIA and
 ⪯  must hold for the new axiom. Yet, this is a contradiction.</p>
          <p>
            To prevent these kinds of issues, we restrict how concepts are refined and RIAs weakened.
In [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ], the refinement of RIAs was not considered at all to avoid these problems. In this paper,
however, we have extended the axiom weakening operator to handle also RIAs. To achieve this,
we must ensure that only simple roles are used when weakening disjoint role axioms or refining
cardinality and Self constraints. Further, it must be guaranteed that all roles that are currently
used in such contexts remain simple when adding the weakened axioms to the ontology. Finally,
the addition of a weakened axiom must maintain the regularity of the RBox.
We now discuss which restrictions we applied in order to satisfy these requirements.
          </p>
        </sec>
        <sec id="sec-1-1-2">
          <title>2.3. Saving Regularity</title>
          <p>
            Firstly, the covers and refinement operators for roles operate only on roles that are simple.
A similar restriction has already been applied in the refinement operator suggested in [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ].
Restricting the refinement to simple roles guarantees that the new axioms created by weakening
will not contain non-simple roles in axioms or concepts where they are not allowed. An
important detail that was not considered in [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ] is that the roles over which the covers operate
must be simple in all ontologies that the weaker axioms are used in. It is therefore not generally
suficient to use the roles that are simple in the reference ontology, since the reference ontology
may not contain all RBox axioms, and therefore contain simple roles that are not simple in the
full ontology. For this reason, we give to the upward and downward cover as an argument not
only the reference ontology ref, but also the full ontology full. Both ref and full share the
same vocabulary  ,  , and . We assume that ref ⊆  full. In the context of repairing
inconsistent ontologies, full can be chosen to be the inconsistent ontology that we want to
repair.
          </p>
          <p>Then, to ensure further that by adding weakened axioms we do not cause a constraint
violation in existing axioms and concepts, we choose the allowed weakening for RIAs such
that all roles that are simple in full, are also simple after adding to it a weakening of one of its
axioms. We observe that for complex RIAs 1 ∘ · · · ∘  ⊑  we should not refine the role .
Since all roles returned by our refinement operator are simple in full, a replacement of  with
a refinement ′ would create an axiom which would make a role which was simple in full
now non-simple. A similar argument can be made for refining  in a simple RIA  ⊑  where
the role  is non-simple in full. So the only way to refine the super role during the weakening
of a RIA is when it is a simple RIA and additionally the sub role of the axiom is simple in full.</p>
          <p>When it comes to refining the left-hand side of RIAs, we do not need any special restrictions.
The main significant observation is that all roles that are returned by the refinement will be
simple. This means that in a simple RIA  ⊑ , even if  is simple, replacing  with another
simple role will not cause  to become non-simple. For a complex RIA 1 ∘ · · · ∘  ⊑  on
the other hand, the role  must already have been non-simple in full, and replacing any 
with a refinement has no efect on which roles are simple.</p>
          <p>A more interesting question is whether such a weakening may still cause a non-regular RBox.
The important insight is that simple roles are always allowed on the left-hand side of a RIA.
While this is more directly evident in some alternative definitions of regularity (e.g., [ 16]) it is
not so apparent from the one presented in this paper. Intuitively, the constraints given above
for regularity disallow dependency cycles that contain complex RIAs. Simple roles cannot be
part of such a cycle, since the cycle must contain at least one complex RIA to be a violation of
the constraint, and all roles that depend in this sense on a complex RIA must be non-simple. A
more formal justification for this fact is given in Lemma 4. Since all refinements of the left-hand
side of RIAs are performed using simple roles, these cannot lead to a non-regular RBox. Further,
refinements of the super role of RIAs are only performed on simple RIAs  ⊑  where  is a
simple role. Since  is simple in this case, all refinements of  are allowed, potentially also if
the refinement yielded a non-simple role.</p>
          <p>Definition 2. Let  be a ℛℐ ontology. The set of subconcepts of  is given by
sub() = {⊤, ⊥} ∪</p>
          <p>⋃︁ sub() ∪
()∈</p>
          <p>⋃︁ (sub() ∪ sub()) ,
⊑∈
where sub() is the set of subconcepts in .</p>
          <p>We will define now the upward and downward cover sets for concepts and roles. Intuitively,
for a given concept the upward cover is the set of the most specific generalizations from the
(fixed) set of subconcepts or roles, while the downward cover set contains the most general
specializations from the same set of subconcepts and roles. (Note that the related open search
for e.g. a least common subsumer is in general a harder problem [17].) We define the upward
and downward cover additionally also for non-negative integers, as they will be useful in the
refinement of cardinality constraints.</p>
          <p>Definition 3. Let full and ref ⊆  full be two ℛℐ ontologies that share the same
vocabulary  , , and  . The upward cover and downward cover for a concept  are given
by</p>
          <p>UpCoverref,full () = { ∈ sub(full) |  ⊑ref  and
DownCoverref,full () = { ∈ sub(full) |  ⊑ref  and
∄′ ∈ sub(full) with  ⊏ref ′ ⊏ref } ,
∄′ ∈ sub(full) with  ⊏ref ′ ⊏ref } .</p>
          <p>The upward and downward covers for a role  are given by
The upward and downward covers for a non-negative integer  are given by</p>
          <p>UpCoverref,full () = { ∈ ℒ() |  ⊑ref  and
∄′ ∈ ℒ() with  ⊏ref ′ ⊏ref  and
, ′ are simple in full} ,
DownCoverref,full () = { ∈ ℒ() |  ⊑ref  and
∄′ ∈ ℒ() with  ⊏ref ′ ⊏ref  and
, ′ are simple in full} .</p>
          <p>DownCoverref,full () =</p>
          <p>UpCoverref,full () = {,  + 1} ,
{︃{} if n = 0
{,  − 1} if n &gt; 0
.</p>
          <p>Since they operate only over the subconcepts of full, on their own, the upward and downward
covers of concepts are missing some interesting refinements.</p>
          <p>Example 2. Let  = {, , },  = {, }, and  = { ⊑ ,  ⊑ }. sub() =
{⊤, ⊥, , }. The upward cover of  ⊔ is equal to UpCover,( ⊔) = {⊤}. The potentiality
refinement to  ⊔  will be missed even by iterated application of the upward cover because
 ⊔  ̸∈ sub(). Similarly, UpCover,(∀.) = {⊤}, even if ∀. and ∀. are reasonable
generalizations.</p>
          <p>To also capture these omissions, we define generalization and specialization operators that
exploit the recursive structure of the concept being refined to generate more complex refinements.
For convenience, we also define these operators for roles.
recursively by induction on the structure of concepts as follows.</p>
          <p>Definition 4.
map every concept to a finite subset of
every non-negative integer to a finite subset of
ℒ( , ,  ), every role to a subset of ℒ(), and</p>
          <p>N0. The abstract refinement operator is defined
Let ↑ and ↓ be two functions with domain ℒ( , ,  ) ∪ ℒ() ∪ N0. They
 ↑,↓() = ↑() ,  ∈  ∪ {⊤, ⊥} ,
 ↑,↓(¬) = ↑(¬) ∪ {¬′ | ′ ∈  ↓,↑()} ,
 ↑,↓( ⊓ ) = ↑( ⊓ ) ∪ {′ ⊓  | ′ ∈  ↑,↓()} ∪ { ⊓ ′ | ′ ∈  ↑,↓()} ,
 ↑,↓( ⊔ ) = ↑( ⊔ ) ∪ {′ ⊔  | ′ ∈  ↑,↓()} ∪ { ⊔ ′ | ′ ∈  ↑,↓()} ,
 ↑,↓(∀.) = ↑(∀.) ∪ {∀′. | ′ ∈ ↓()} ∪ {∀.′ | ′ ∈  ↑,↓()} ,
 ↑,↓(∃.) = ↑(∃.) ∪ {∃′. | ′ ∈ ↑()} ∪ {∃.′ | ′ ∈  ↑,↓()} ,</p>
          <p>ℛℐ concepts:
 ↑,↓({}) = ↑({}) ,
 ↑,↓(∃.Self ) = ↑(∃.Self ) ∪ {∃′.Self | ′ ∈ ↑()} ,
 ↑,↓(≥  .) = ↑(≥  .) ∪ {≥  ′. | ′ ∈ ↑()}
 ↑,↓(≤  .) = ↑(≤  .) ∪ {≤  ′. | ′ ∈ ↓()}
∪ {≥  .′ | ′ ∈  ↑,↓()} ∪ {≥  ′. | ′ ∈ ↓()} ,
∪ {≤  .′ | ′ ∈  ↓,↑()} ∪ {≤  ′. | ′ ∈ ↑()} ,
ℛℐ roles:
 ↑,↓() = ↑() .
operator and specialization operator are, respectively, defined as
From the abstract refinement operator  ↑,↓, two concrete refinement operators, the generalization
 ref,full =  UpCoverref,full ,DownCoverref,full and
 ref,full =  DownCoverref,full ,UpCoverref,full .
prove useful in the remainder of this paper.</p>
          <p>Revisiting the case in Example 2 we observe that  ,( ⊔ ) = {⊤, ⊤ ⊔ ,  ⊔ ,  ⊔ }
does contain  ⊔  as a possible refinement. Similarly, 
contains ∀.. We will show now some basic properties of 
,(∀.) = {⊤, ∀., ∀., ∀.}
ref,full and 
ref,full that will
,  ∈ ℒ( , ,  ) ∪ ℒ():
Lemma 1. For every pair of ℛℐ ontologies 
1. generalisation: if  ∈</p>
          <p>specialisation: if  ∈ 
2. generalisation finiteness:
specialisation finiteness:
ref,full ( ) then  ⊑ref 
ref,full ( ) then  ⊑ref 


ref,full ( ) is finite
ref,full ( ) is finite
operators.</p>
          <p>We define now the axiom weakening operator using these generalization and specialization
ref, 
full and every pair of concepts or roles
Definition 5. Given an axiom , the set of weakenings with respect to the reference ontology
ref and full ontology full, written ref,full () is defined such that
ref,full (1 ∘ · · · ∘</p>
          <p>The axioms in the set ref,full () are indeed weaker than  for every axiom , in the sense
that, given the reference ontology ref,  entails them and the opposite in not necessarily true.
Lemma 2. For every ℛℐ axiom , if ′ ∈ ref,full (), then  |=ref ′</p>
          <p>Clearly, replacing an axiom in the full ontology with a weakening cannot reduce the number
of models of the ontology. However, for the weakening to be useful in practice, we must show
additionally that by adding the weakened axioms to the ontology will not violate any of the
constraints that ensure the decidability of ℛℐ. To do this, we show first that all roles that
are simple in full are also simple in the ontology obtained by adding the weakening of any
axiom.</p>
          <p>Lemma 3. Let  be an ontology such that all simple roles of full are also simple in . For every
axiom  ∈  and role , if ′ ∈ ref,full () and  simple in , then  is simple in  ∪ {′}.</p>
          <p>Note that removal of axioms will never cause a role that was previously simple to become
non-simple, so all roles simple in  are also simple in  ∖ {} ∪ {′}. Further, it should be noted
that repeated replacement of axioms with weakened axioms keeps simple roles simple. This
is an important observation, since repeated weakening is required for the proposed ontology
repair algorithm.</p>
          <p>Lemma 4. Let  be an ontology such that all simple roles of full are also simple in . For every
axiom  ∈ , if ′ ∈ ref,full () and the RBox of  is regular, then the RBox of  ∪ {′} is also
regular.</p>
          <p>Like for the invariant on simple roles, also regularity is maintained by repeated replacement
of axioms with weakenings. With the help of Lemma 3 and Lemma 4 we can now show that
adding weakened axioms to a ℛℐ ontology will yield another valid ℛℐ ontology.
Theorem 1. Given that ref and full are valid ℛℐ ontologies. For every axiom  ∈ full,
if ′ ∈ ref,full (), then full ∪ {′} is a valid ℛℐ ontology.</p>
        </sec>
      </sec>
      <sec id="sec-1-2">
        <title>3. Implementing and Evaluating Axiom Weakening for  ℛℐ</title>
        <p>
          The refinement operators and axiom weakening have previously been implemented for ℒ in
[
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Based on this, we have extended the implementation to cover the full range of ℛℐ
axioms and concepts.1 The concept refinement and axiom weakening operators for ℛℐ
have been implemented as discussed above. Further, we implemented a repair algorithm using
the axiom weakening operator based on the procedures already proposed in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] and [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. The
implementation performs weakening in OWL 2 DL [13] and is implemented in Java using the
OWL API [14]. A plug-in for the ontology development tool Protégé has also been implemented,
but will not be discussed in detail in this paper.2 The plug-in allows for manually weakening
axioms and executing the automatic repair algorithm.
        </p>
        <p>Algorithm 1 RepairOntologyWeaken()
fruefll ← 
 ← FindMaximalConsistentSubset()
while  is inconsistent do
bad ← FindBadAxiom()
Φweaker ← ref,full (bad)
weaker ← SelectWeakerAxiom(Φweaker)
 ← ( ∖ {bad}) ∪ {weaker}
end while
Return 
Algorithm 2 RepairOntologyRemove()
while  is inconsistent do
bad ← FindBadAxiom()
 ←  ∖ { bad}
end while
Return</p>
        <p>The automatic repair by weakening is implemented as shown in Algorithm 1. The reference
ontology is selected by choosing a maximal consistent subset of the inconsistent ontology. In
our implementation used for the evaluation in this paper, the reference ontology was selected
by randomly sampling a maximal consistent subset. The procedure FindBadAxiom() may be
implemented in a number of ways. Here we consider an implementation that samples some (or
all) of the minimal inconsistent subsets of  and selects as the bad axiom the one occurring most
frequently. Then, SelectWeakerAxiom(Φ weaker) has been chosen such that is selects an axiom
uniformly at random from Φ weaker. Regarding termination, we showed that the corresponding
algorithm for weakening for the ℒ fragment almost certainly terminates (the event in which
it does not terminate has probability 0) [18], and we expect a similar result to hold for the
extended weakening procedure for ℛℐ, however, we here must leave the verification of
the details to future work. For all experiments presented in this paper, the FaCT++ reasoner
[19] was used to compute all entailment and consistency checks.</p>
        <p>
          To experimentally evaluate the proposed axiom weakening operator in the context of its use
in automatic repair of ontologies, we need some way to compare the quality of repair. As has
already been discussed in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], the problem of deciding which of two possible repaired ontologies
1 or 2 is preferable is not generally well-defined. Similar to what has been proposed in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]
we will base the evaluation of the repairs on the size of the inferred class hierarchy. To compare
two possible repairs, we use the inferable information content (IIC) as defined in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. The IIC
1The source code for the implementation is available at https://github.com/rolandbernard/ontologyutils.
2The Protégé plugin is available at https://github.com/rolandbernard/protege-weakening.
the role hierarchy is entirely ignored.
of an ontology 1 with respect to a second ontology 2, written IIC(1, 2), is a number
between 0 and 1. A value closer to 1 indicates that 1 contains more “information” than 2,
while a value towards 0 indicates the opposite. Some weaknesses of this measure when it comes
to evaluating repairs, like the fact that only atomic concepts are considered, have already been
discussed in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. For the case of repairing ℛℐ ontologies this is even more relevant, since
Definition 6.
        </p>
        <p>The inferred class hierarchy of an ontology  is given by</p>
        <p>Inf() = { ⊑  | ,  ∈  and  |=  ⊑ } .</p>
        <p>The inferable information content of an ontology 1 with respect to another ontology 2 is
given by</p>
        <p>IIC(1, 2) =</p>
        <p>card(Inf(1) ∖ Inf(2))
card(Inf(1) ∖ Inf(2)) + card(Inf(2) ∖ Inf(1))
where card( ) is the cardinality of the set  .</p>
        <p>For the experimental evaluation we have selected ontologies of varying size and expressivity
from BioPortal3 [20]. Additionally, the pizza ontology4 was included in the testing. Some
characteristics of the used ontologies are shown in Table 1. On average, they contain about 289
axioms, 73 concept names, 29 role names, and 168 subconcepts.</p>
        <p>Since the ontologies use OWL 2, the axioms and concepts do not map directly to ℛℐ.
In order to follow the definitions laid out in this paper, the OWL ontologies axioms were
4Available from Protégé at https://protege.stanford.edu/ontologies/pizza/pizza.owl.
normalized to conform with ℛℐ. During the preprocessing, we further removed axioms
related to data properties and any axiom that caused any OWL 2 DL profile violation, as our
weakening does not handle them.</p>
        <p>The evaluation proceeds by first making the ontologies inconsistent. This was achieved by
repeatedly adding axioms to the ontology until they became inconsistent. The newly added
axioms were generated by strengthening randomly selected axioms of the original ontology.
It was ensured that the added axioms on their own were not inconsistent. After making the
ontology inconsistent, it was repaired once with the repair algorithm using the axiom weakening
operator presented in Algorithm 1 and once using Algorithm 2. Additionally, the repair was also
performed by selecting a randomly sampled maximal consistent subset. Note that Algorithm 2 is
not guaranteed to produce a maximal consistent subset. This process, both making the ontology
inconsistent and then repairing it, was repeated one hundred times for each ontology, and the
IIC was computed between the repairs generated using the diferent approaches. The evaluation
was performed using a randomly selected maximal consistent subset as the reference ontology
and by sampling 16 minimal inconsistent subsets during the selection of bad axioms.</p>
        <p>Unfortunately, even though the utilized reasoners are generally very fast to evaluate queries
on the selected ontologies, they exhibit undesirable performance in some edge cases. When
performance pitfalls are encountered, they make the computations required for weakening
unreasonably slow. For this reason a timeout of 5 minutes was placed on the repairs execution
and the outputs of these runs were discarded and replaced by new runs. The results of these
experiments are listed in Table 2 and shown in Figure 1 and Figure 2.</p>
        <p>
          The results of the evaluation suggest that the repair by weakening is on average about as good
or better than the repair by removal of axioms. While this supports the conclusion in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] that
weakening is able to retain more information than removal, the observed advantage was worse
than what has been observed in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. In contrast, it can be seen that the repair using weakening
is not in general better than choosing a random maximal consistent subset. There are ontologies
for which the repairs by weakening are on average significantly worse when comparing using
IIC. This is however a somewhat unequal comparison. An alternative repair algorithm could
start with a maximal consistent subset and use weakening to add in more information from the
remaining axioms. Still, this result suggests that the heuristic used for selecting bad axioms is
not reliable for preserving information, at least with respect to the chosen measure.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>4. Conclusions and Outlook</title>
      <p>We have proposed refinement operators and an axiom weakening operator for all aspects
of ℛℐ and shown that for repairs of inconsistent ontologies weakening can, in some
cases, significantly outperform removal. Further additions to the refinement operators may be
studied, e.g., using non-simple roles in the upward and downward covers in certain contexts.
Relaxing the allowed weakening for RIAs may also be considered, and to cover also extensions to
regularity conditions such as those studied in [21]. We have also seen that the repair algorithm
likely needs better heuristics to steer the selection of bad and weakened axioms in order to
result in better repairs. Future work could further focus on finding more robust measures for
comparing the quality of repairs.
[12] F. Baader, I. Horrocks, C. Lutz, U. Sattler, An Introduction to Description Logic, Cambridge</p>
      <p>University Press, 2017.
[13] OWL 2 Web Ontology Language. Structural Specicfiation and Functional-Style Syntax
(Second Edition) (2012). URL: http://www.w3.org/TR/owl2-syntax/.
[14] M. Horridge, S. Bechhofer, The OWL API: A Java API for OWL Ontologies, Semantic Web
2 (2011) 11–21.
[15] D. Lembo, M. Lenzerini, R. Rosati, M. Ruzzi, D. F. Savo, Inconsistency-tolerant semantics
for description logics, in: P. Hitzler, T. Lukasiewicz (Eds.), Web Reasoning and Rule Systems
- Fourth International Conference, RR 2010, Bressanone/Brixen, Italy, September 22-24,
2010. Proceedings, volume 6333 of Lecture Notes in Computer Science, Springer, 2010, pp.
103–117.
[16] S. Rudolph, Foundations of description logics, Reasoning Web. Semantic Technologies for
the Web of Data: 7th International Summer School 2011, Galway, Ireland, August 23-27,
2011, Tutorial Lectures 7 (2011) 76–136.
[17] F. Baader, Least common subsumers and most specific concepts in a description logic with
existential restrictions and terminological cycles, in: G. Gottlob, T. Walsh (Eds.), IJCAI-03,
Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence,
Acapulco, Mexico, August 9-15, 2003, Morgan Kaufmann, 2003, pp. 319–324.
[18] R. Confalonieri, P. Galliani, O. Kutz, D. Porello, G. Righetti, N. Troquard, Almost Certain
Termination for ℒ Weakening, in: G. Marreiros, B. Martins, A. Paiva, B. Ribeiro,
A. Sardinha (Eds.), Progress in Artificial Intelligence: 21st EPIA Conference on Artificial
Intelligence, EPIA 2022, Lisbon, Portugal, August 31–September 2, 2022, volume 13566 of
Lecture Notes in Computer Science, Springer, 2022, pp. 663–675.
[19] D. Tsarkov, I. Horrocks, Fact++ description logic reasoner: System description, in:
Automated Reasoning: Third International Joint Conference, IJCAR 2006, Seattle, WA,
USA, August 17-20, 2006. Proceedings 3, Springer, 2006, pp. 292–297.
[20] P. L. Whetzel, N. F. Noy, N. H. Shah, P. R. Alexander, C. Nyulas, T. Tudorache, M. A.</p>
      <p>Musen, Bioportal: enhanced functionality via new web services from the national center
for biomedical ontology to access and use ontologies in software applications, Nucleic
acids research 39 (2011) W541–W545.
[21] Y. Kazakov, An Extension of Complex Role Inclusion Axioms in the Description Logic
ℛℐ, in: J. Giesl, R. Hähnle (Eds.), Automated Reasoning, 5th International Joint
Conference, IJCAR 2010, Edinburgh, UK, July 16-19, 2010. Proceedings, volume 6173 of
Lecture Notes in Computer Science, Springer, 2010, pp. 472–486.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Schlobach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cornet</surname>
          </string-name>
          ,
          <article-title>Non-standard reasoning services for the debugging of description logic terminologies</article-title>
          , in: G. Gottlob, T. Walsh (Eds.),
          <source>IJCAI-03, Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence, Acapulco, Mexico, August</source>
          <volume>9</volume>
          -
          <issue>15</issue>
          ,
          <year>2003</year>
          , Morgan Kaufmann,
          <year>2003</year>
          , pp.
          <fpage>355</fpage>
          -
          <lpage>362</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kalyanpur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Parsia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Sirin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hendler</surname>
          </string-name>
          ,
          <article-title>Debugging unsatisfiable classes in OWL ontologies</article-title>
          ,
          <source>Web Semantics: Science, Services and Agents on the World Wide Web</source>
          <volume>3</volume>
          (
          <year>2005</year>
          )
          <fpage>268</fpage>
          -
          <lpage>293</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kalyanpur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Parsia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Sirin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <article-title>Repairing unsatisfiable concepts in OWL ontologies</article-title>
          , in: Y.
          <string-name>
            <surname>Sure</surname>
          </string-name>
          , J. Domingue (Eds.),
          <source>The Semantic Web: Research and Applications, 3rd European Semantic Web Conference, ESWC</source>
          <year>2006</year>
          , Budva, Montenegro, June 11-14,
          <year>2006</year>
          , Proceedings, volume
          <volume>4011</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2006</year>
          , pp.
          <fpage>170</fpage>
          -
          <lpage>184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Peñaloza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Suntisrivaraporn</surname>
          </string-name>
          ,
          <article-title>Pinpointing in the description logic ℰℒ+</article-title>
          , in: J.
          <string-name>
            <surname>Hertzberg</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Beetz</surname>
          </string-name>
          , R. Englert (Eds.),
          <source>KI 2007: Advances in Artificial Intelligence, 30th Annual German Conference on AI, KI</source>
          <year>2007</year>
          , Osnabrück, Germany,
          <source>September 10-13</source>
          ,
          <year>2007</year>
          , Proceedings, volume
          <volume>4667</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2007</year>
          , pp.
          <fpage>52</fpage>
          -
          <lpage>67</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Troquard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Confalonieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Galliani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Peñaloza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Porello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kutz</surname>
          </string-name>
          , Repairing Ontologies via Axiom Weakening, in: S. A.
          <string-name>
            <surname>McIlraith</surname>
            ,
            <given-names>K. Q.</given-names>
          </string-name>
          <string-name>
            <surname>Weinberger</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence</source>
          ,
          <source>(AAAI-18)</source>
          , New Orleans, Louisiana, USA, February 2-
          <issue>7</issue>
          ,
          <year>2018</year>
          , AAAI Press,
          <year>2018</year>
          , pp.
          <fpage>1981</fpage>
          -
          <lpage>1988</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Confalonieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Galliani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Porello</surname>
          </string-name>
          , G. Righetti,
          <string-name>
            <given-names>N.</given-names>
            <surname>Troquard</surname>
          </string-name>
          ,
          <article-title>Towards even more irresistible axiom weakening</article-title>
          , in: S. Borgwardt, T. Meyer (Eds.),
          <source>Proceedings of the 33rd International Workshop on Description Logics (DL</source>
          <year>2020</year>
          ), volume
          <volume>2663</volume>
          ,
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Qi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Fu</surname>
          </string-name>
          ,
          <article-title>A practical fine-grained approach to resolving incoherent owl 2 dl terminologies</article-title>
          ,
          <source>in: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>919</fpage>
          -
          <lpage>928</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Confalonieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Eppe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schorlemmer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Peñaloza</surname>
          </string-name>
          , E. Plaza,
          <article-title>Upward Reifnement Operators for Conceptual Blending in the Description Logic ℰ ℒ++</article-title>
          ,
          <source>Annals of Mathematics and Artificial Intelligence</source>
          <volume>82</volume>
          (
          <year>2018</year>
          )
          <fpage>69</fpage>
          -
          <lpage>99</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Kriegel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nuradiansyah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Peñaloza</surname>
          </string-name>
          ,
          <article-title>Making repairs in description logics more gentle</article-title>
          ,
          <source>in: Principles of Knowledge Representation and Reasoning: Proceedings of the Sixteenth International Conference, KR</source>
          <year>2018</year>
          , Tempe, Arizona,
          <volume>30</volume>
          <fpage>October</fpage>
          - 2
          <source>November</source>
          <year>2018</year>
          ,
          <year>2018</year>
          , pp.
          <fpage>319</fpage>
          -
          <lpage>328</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>I.</given-names>
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kutz</surname>
          </string-name>
          , U. Sattler,
          <article-title>The even more irresistible ℛℐ</article-title>
          , in: P. Doherty,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Welty</surname>
          </string-name>
          (Eds.),
          <source>Proceedings, Tenth International Conference on Principles of Knowledge Representation and Reasoning</source>
          ,
          <source>Lake District of the United Kingdom, June 2-5</source>
          ,
          <year>2006</year>
          , AAAI Press,
          <year>2006</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>67</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kazakov</surname>
          </string-name>
          , ℛℐ and ℛℐ
          <article-title>Are Harder than ℋℐ</article-title>
          , in: G. Brewka, J. Lang (Eds.),
          <source>Principles of Knowledge Representation and Reasoning: Proceedings of the Eleventh International Conference, KR</source>
          <year>2008</year>
          , Sydney, Australia,
          <source>September 16-19</source>
          ,
          <year>2008</year>
          , AAAI Press,
          <year>2008</year>
          , pp.
          <fpage>274</fpage>
          -
          <lpage>284</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>