Formal Concept Analysis



Similar documents
About Universality and Flexibility of FCA-based Software Tools

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets

A Finite State Model for On-Line Analytical Processing in Triadic Contexts

Query-Based Multicontexts for Knowledge Base Browsing: an Evaluation

Conceptual Knowledge Discovery and Data Analysis

>

Chapter 15: Computer Security and Privacy

Guide to Pro Spam Remove

Release Notes, February 2009

Microsoft Outlook 2007: Advanced Topics

Formal Concept Analysis used for object-oriented software modelling Wolfgang Hesse FB Mathematik und Informatik, Univ. Marburg

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS

INFORMATION TECHNOLOGY CONTROLS

IBM Tivoli Storage Manager for Microsoft SharePoint

Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. Objectives

Full-text Search in Intermediate Data Storage of FCART

Computing Services Information Security Office. Security 101

Appendix F.: The Contract with Struktur AG, Sttugart, Germany 01/29

Ontology-Based Filtering Mechanisms for Web Usage Patterns Retrieval

HP Quality Center. Software Version: Version Control Add-in Guide

ANSYS EKM Overview. What is EKM?

1/4/12 Installing and Configuring WebDAV on IIS 7 : WebDAV for IIS 7.0 : Publishing Content to Web Sites : T

StarWind iscsi SAN Software: Using with Citrix XenServer

Configuration and Utilization of the OLAP Cache to Improve the Query Response Time

A STUDY IN USER-CENTRIC DATA INTEGRATION

FCART: A New FCA-based System for Data Analysis and Knowledge Discovery

Technical Bulletin. SQL Express Backup Utility

Changing the C Interface IP Address: step-by-step

Document Management User Guide

New in this release: On-Demand Sync. Known Issues: Limitations: Previous version features:

Monitoring BPMN-Processes with Rules in a Distributed Environment

DocumentsCorePack for MS CRM 2011 Implementation Guide

1 Which of the following questions can be answered using the goal flow report?

Rational DOORS Next Generation. Quick Start Tutorial

Technical Documentation SEPPmail Outlook Add-In v1.5.3

Major Risks and Recommended Solutions

AxCMS.net on Network Load Balancing (NLB) Environment

A Comparison of Variable Selection Techniques for Credit Scoring

Policies Middletown Public Schools Employee Telecommunications Equipment and Use Policy EMPLOYEES TELECOMMUNICATIONS EQUIPMENT AND USE POLICY

PART 10 COMPUTER SYSTEMS

Personal Digital Document Management

Compuprint 4247 Serial Matrix Printers

How To Create A Text Classification System For Spam Filtering

SWAP: ONTOLOGY-BASED KNOWLEDGE MANAGEMENT WITH PEER-TO-PEER TECHNOLOGY

Fight fire with fire when protecting sensitive data

USER GUIDE. Unit 2: Synergy. Chapter 2: Using Schoolwires Synergy

Different Types of Alerts for Process Chains. Table of Content

Workflow Solutions for Very Large Workspaces

Combi B PC software 8213X. Installation and operating instructions

Comprehensive Guide to Moving a File Server to Google Drive

Workflow Object Driven Model

Montefiore Portal Quick Reference Guide

PCD Test Tools. These tools provide various test functions for the Power Chain Device Toolkit web services (BACnetWS+).

Qualitative Social Research for Rural Development Studies

Intellicus Cluster and Load Balancing- Linux. Version: 7.3

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Kaspersky Security Center 10 Getting Started

Microsoft FTP Configuration Guide for Helm 4

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007

Exporting s from Outlook Version 1.00

Efficient Spam Filtering using Adaptive Ontology

Anomaly Detection and Predictive Maintenance

Big Data Governance Certification Self-Study Kit Bundle

Inspection, Testing and Maintenance

EDIminer: A Toolset for Process Mining from EDI Messages

Design Report: Resource Management Software CS400 Senior Design I

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

Advanced Analytics Course Series

WHAT S NEW 4.5. FileAudit VERSION.

Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments

Librarian. Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER

Transcription:

Formal Concept Analysis Applications Robert Jäschke Asmelash Teka Hadgu FG Wissensbasierte Systeme/L3S Research Center Leibniz Universität Hannover Robert Jäschke (FG KBS) Formal Concept Analysis 1 / 13

History of Formal Concept Analysis Formal Concept Analysis (FCA) originated in Darmstadt, Germany around 1980 as a mathematical theory that delivers a formalization of the concept of a concept. Since then, FCA spread into different areas of computer science, e.g., data analysis knowledge discovery software engineering Starting from datasets, FCA derives concept hierarchies. FCA allows you to create and visualize concept hierarchies based on well-grounded mathematical foundations. Robert Jäschke (FG KBS) Formal Concept Analysis 2 / 13

Example: Comparison of Coffee Machines Robert Jäschke (FG KBS) Formal Concept Analysis 3 / 13

Database Marketing at Jelmoli AG, Zurich 1 22994 travel accessoires perfumery ladies accessoires 4374 17472 12770 2816 2332 8323 <= 1000 8323 >0 1849 <=400 7684 4233 >100 <=100 6546 3594 3493 >400 =0 4830 2456 2854 1777 >1000 4090 740 1716 1138 639 1 J. Hereth, G. Stumme, R. Wille, and U. Wille. Conceptual knowledge discovery and data analysis. In Proc. ICCS 2000, volume 1867 of LNCS, pages 421 437. Springer, Berlin/Heidelberg, 2000. Robert Jäschke (FG KBS) Formal Concept Analysis 4 / 13

Analysis of Plane Movements at Frankfurt Airport 2 O12 Ort der benötigten Staubahn [SBE] G12a Positionen (grobe Struktur) [POS] T2 W V G T1 M keine Angabe 460 124 8551 1414 8345 45 18939 sonst. Angaben 460 4106 124 2306 134 1037 45 Halle A Halle B Halle C Halle Mitte Terminal 2 Vorfeld V3 keine unbekannte 2503 2940 497 1635 5316 1942 4106 78 2425 150 2790 16 481 216 1415 3867 1269 1918 460 124 2306 134 1037 45 4 180 7 17 2 G. Stumme, R. Wille, and U. Wille. Conceptual knowledge discovery in databases using formal concept analysis methods. In Proc. PKDD, volume 1510 of LNCS, pages 450 458. Springer, Berlin/Heidelberg, 1998. Robert Jäschke (FG KBS) Formal Concept Analysis 5 / 13

IT Security Management 3 S4.39 Deactivation for periods of absence S2.54 Procurement/selection of suitable answering machines S3.16 Briefing personnel on the operation of answering machines S2.4 Maintenance/repair regulations T4.1 Disruption of power supply S2.57 Regular playback and deletion of recorded messages S2.11 Provisions governing the use of security codes S1.29 Adequate siting of an IT system S4.38 Deactivation of unneccessary service features S2.55 Use of security code S6.40 Regular battery checks/replacements T2.5 Lack of, or inadequate, maintenance T4.18 Discharged or fatigued emergency power supply T2.1 Lack of, or insufficient, rules T3.15 Incorrect operation of answering machines T1.8 Dust, soiling T5.37 Determining security codes T4.19 Information loss due to full storage medium S2.56 Avoidance of confidential information S2.58 Limitation of message time S1.23 Locked doors T2.6 unauthorized access to rooms requiring protection T5.36 Deliberate overloading of answering machines T5.38 Misuse of remote inquiry features 3 K. Becker, G. Stumme, R. Wille, U. Wille, and M. Zickwolff. Conceptual information systems discussed through an it-security tool. In Rose Dieng and Olivier Corby, editors, Knowledge Engineering and Knowledge Management Methods, Models, and Tools, volume 1937 of LNCS, pages 352 365. Springer, Berlin/Heidelberg, 2000. Robert Jäschke (FG KBS) Formal Concept Analysis 6 / 13

Text Clustering 4 4 A. Hotho, S. Staab, G. Stumme. Ontologies improve text document clustering. In Proc. ICDM, pages 541 544, 2003. Robert Jäschke (FG KBS) Formal Concept Analysis 7 / 13

Concept Email Manager Conferences/ICCS2000 vs. AUSTRALIA/eklund.peter conventional e-mail programs store mails in a tree structure only one search path exists which must already been set when saving the mail Robert Jäschke (FG KBS) Formal Concept Analysis 8 / 13

Concept Email Manager In CEM an e-mail can be tagged with several keywords. Robert Jäschke (FG KBS) Formal Concept Analysis 9 / 13

Concept Email Manager Several search paths are possible: Darmstadt/KVO/KVO Members KVO/Darmstadt/KVO Members KVO/KVO Members/Darmstadt Robert Jäschke (FG KBS) Formal Concept Analysis 10 / 13

Concept Email Manager Mails from sub-folders can also be found in parent folders. Several search paths are possible: Darmstadt/KVO/KVO Members KVO/Darmstadt/KVO Members KVO/KVO Members/Darmstadt Robert Jäschke (FG KBS) Formal Concept Analysis 11 / 13

Concept Email Manager Several views can be combined. Robert Jäschke (FG KBS) Formal Concept Analysis 12 / 13

CUBIST Visual Analytics Robert Jäschke (FG KBS) Formal Concept Analysis 13 / 13