scholarly journals Trójwarstwowa struktura informacji w treści wypowiedzi1 (szkic o programie Gramatyki Rozproszonej)

2016 ◽  
pp. 73-112 ◽  
Author(s):  
André Włodarczyk ◽  
Hélène Włodarczyk

The idea of the three-tier information structure in the content of utterances is the result of research carried out in a transdisciplinary spirit, within sciences such as linguistics, psychology, logic and computer science. The theory of Meta-Informative Centering (MIC) of attention, which borrows the concept of attention centering from psychology and the concept of information from computer science, makes it possible to treat ―information structures" or "thematic-rhematic structures" as strictly dependent on the canonical form of utterances (as the manifestation of predication). Thus, an important feature of the MIC theory is its reference to predication, and in particular to the language of classical logic (first-order predicate logic). In the light of MIC theory, "information structure" appears in fact to be a structure of meta-information (representing "information about information") with respect to orthoinformation (proper information; i.e. situation frame, its types and aspects, roles, spatio-temporal anchors etc.) contained in the utterances. It is the theory of Associative Semantics (AS), which is being developed in parallel to the theory of MIC, which constitutes the layer of ortho-information. However, the foundational role in the structure of information content of utterances is played by para-information ("information which is similar or related to some other information"). In order to treat systematically the structure of information (ortho-, meta- and para-information) as contained in language utterances, and for representing their fundamental components, we proposed using ―formal concepts‖ belonging to the rapidly developing new field of research in computer science under the general name of ―Formal Concept Analysis‖ (FCA). The most important operations (responsible for the structure of information contained in the body of the utterances) are as follows: (a) selection (for building conceptual areas of interest in the para-information tier), (b) configuration (for building relationships between concepts in the ortho-information tier) and (c) centering (secondary selection of concepts for transmitting in the meta-information tier), while the most important operations (responsible for the structure of utterances) are: (a) nesting (for building utterances as units of discourse in the profile, across the tiers) and (b) encapsulation (for designating the conceptual space and combining conceptual representations with the language). In this paper we present one of the many areas of application of the described theoretical foundation, namely: word order in linguistic typology. Research taking into account the abovementioned three kinds of information constitutes a contribution to the construction of a coherent theoretical framework for Distributed Grammar (i.e. multi-tier grammar with a generalized idiomatics).

2018 ◽  
Vol 21 ◽  
pp. 49-53
Author(s):  
Pēteris Grabusts

In the modern sense, the concept of information warfare includes the use and management of information and communication technologies to achieve a competitive advantage compared to the opponent. An information warfare is a manipulation with information that trusts a goal without an objective understanding, so that the goal is to take decisions against its own interests in the interests of the opponents. Information structures are considered as systems that produce and process various types of information, provide the storage of information and access to users. Such information structures may include neural networks, adaptive learning systems, etc. They must be prepared to train, respond to threats and ensure the safety of their existence, which is very topical during modern information warfare. This analytical article will cover more theoretical aspects related to the security of information systems from the system theory point of view. Knowledge base of the information structure can be a neural network, in which training should be provided from external threats.The author considers artificial neural networks as one of the potential threats in the context of information warfare.


2021 ◽  
pp. 1-26
Author(s):  
Rui-Lin Liu ◽  
Hai-Long Yang ◽  
Li-Juan Zhang

This paper studies information structures in a fuzzy β-covering information system. We introduce the concepts of a fuzzy β-covering information system and homomorphism between them, and investigate related properties. The concept of information structure of a fuzzy β-covering information system is given. We discuss the relationships between information structures from the view of dependence and separation. Then granularity measures for a fuzzy β-covering information system are studied. Finally, we discuss invariance of fuzzy β-covering information systems under homomorphism and illustrate its application on data compression.


2008 ◽  
Vol 45 (02) ◽  
pp. 580-586 ◽  
Author(s):  
Ehud Lehrer ◽  
Eran Shmaya

In a decision problem with uncertainty a decision maker receives partial information about the actual state via an information structure. After receiving a signal, he is allowed to withdraw and gets zero profit. We say that one structure is better than another when a withdrawal option exists if it may never happen that one structure guarantees a positive profit while the other structure guarantees only zero profit. This order between information structures is characterized in terms that are different from those used by Blackwell's comparison of experiments. We also treat the case of a malevolent nature that chooses a state in an adverse manner. It turns out that Blackwell's classical characterization also holds in this case.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Ting Qian ◽  
Ling Wei

As an important tool for data analysis and knowledge processing, formal concept analysis (FCA) has been applied to many fields. In this paper, we introduce a new method to find all formal concepts based on formal contexts. The amount of intents calculation is reduced by the method. And the corresponding algorithm of our approach is proposed. The main theorems and the corresponding algorithm are examined by examples, respectively. At last, several real-life databases are analyzed to demonstrate the application of the proposed approach. Experimental results show that the proposed approach is simple and effective.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Tehmina Amjad ◽  
Mehwish Sabir ◽  
Azra Shamim ◽  
Masooma Amjad ◽  
Ali Daud

PurposeCitation is an important measure of quality, and it plays a vital role in evaluating scientific research. However, citation advantage varies from discipline to discipline, subject to subject and topic to topic. This study aims to compare the citation advantage of open access and toll access articles from four subfields of computer science.Design/methodology/approachThis research studies the articles published by two prestigious publishers: Springer and Elsevier in the author-pays charges model from 2011 to 2015. For experimentation, four sub-domains of computer science are selected including (a) artificial intelligence, (b) human–computer interaction, (c) computer vision and graphics, and (d) software engineering. The open-access and toll-based citation advantage is studied and analyzed at the micro level within the computer science domain by performing independent sample t-tests.FindingsThe results of the study highlight that open access articles have a higher citation advantage as compared to toll access articles across years and sub-domains. Further, an increase in open access articles has been observed from 2011 to 2015. The findings of the study show that the citation advantage of open access articles varies among different sub-domains of a subject. The study contributed to the body of knowledge by validating the positive movement toward open access articles in the field of computer science and its sub-domains. Further, this work added the success of the author-pays charges model in terms of citation advantage to the literature of open access.Originality/valueTo the best of the authors’ knowledge, this is the first study to examine the citation advantage of the author-pays charges model at a subject level (computer science) along with four sub-domains of computer science.


2021 ◽  
Vol 13 (3) ◽  
pp. 156-162
Author(s):  
Nataliya Blaga ◽  
◽  
Volodymyr Hobela

The mechanism of communication process and information security at an enterprise is considered. The theoretical aspects of the communications at the enterprise are based on the variety of its form and the relation of organizational and information structures: most activities have underlying links via information processes. Thus information security of communication process has a significant impact on the information security of the enterprise as a whole. In modern conditions and circumstances, the information security of the enterprise is largely reduced to cybersecurity and suffers from most threats of the latter. However, the human factor is responsible for most of the real facts of inflicting harm due to information security breaches. Thus, traditional mechanisms of privacy and confidentiality ensuring need to be adapted to new realities. New opportunities also set new requirements for understanding the very concept of information security: information must not only be protected but also timely and accurate as far as it is possible to be provided with modern telecommunication systems and information technologies: information security is a system of information protection of the enterprise – protection against theft, delayed and inaccurate providing of essential information to the recipient inside the enterprise or outside it. There are proposed and justified four principles necessary but not sufficient to ensure efficient mechanism of information security regarding communication process at small to medium enterprises. These include information awareness of staff even if they are not advanced with information technologies, traditional methods of protection against cyber threats such as passwords and encryption, control over information flows and the infrastructure that provides them, reliable cooperation and protection of remote access. These principles should be followed by managers at all levels.


Mathematics ◽  
2021 ◽  
Vol 9 (21) ◽  
pp. 2694
Author(s):  
Amira Mouakher ◽  
Axel Ragobert ◽  
Sébastien Gerin ◽  
Andrea Ko

Formal concept analysis (FCA) is a mathematical theory that is typically used as a knowledge representation method. The approach starts with an input binary relation specifying a set of objects and attributes, finds the natural groupings (formal concepts) described in the data, and then organizes the concepts in a partial order structure or concept (Galois) lattice. Unfortunately, the total number of concepts in this structure tends to grow exponentially as the size of the data increases. Therefore, there are numerous approaches for selecting a subset of concepts to provide full or partial coverage. In this paper, we rely on the battery of mathematical models offered by FCA to introduce a new greedy algorithm, called Concise, to compute minimal and meaningful subsets of concepts. Thanks to its theoretical properties, the Concise algorithm is shown to avoid the sluggishness of its competitors while offering the ability to mine both partial and full conceptual coverage of formal contexts. Furthermore, experiments on massive datasets also underscore the preservation of the quality of the mined formal concepts through interestingness measures agreed upon by the community.


2005 ◽  
Vol 15 (11) ◽  
pp. 1685-1734 ◽  
Author(s):  
M. A. J. CHAPLAIN ◽  
G. LOLAS

The growth of solid tumours proceeds through two distinct phases: the avascular and the vascular phase. It is during the latter stage that the insidious process of cancer invasion of peritumoral tissue can and does take place. Vascular tumours grow rapidly allowing the cancer cells to establish a new colony in distant organs, a process that is known as metastasis. The progression from a single, primary tumour to multiple tumours in distant sites throughout the body is known as the metastatic cascade. This is a multistep process that first involves the over-expression by the cancer cells of proteolytic enzyme activity, such as the urokinase-type plasminogen activator (uPA) and matrix metalloproteinases (MMPs). uPA itself initiates the activation of an enzymatic cascade that primarily involves the activation of plasminogen and subsequently its matrix degrading protein plasmin. Degradation of the matrix then enables the cancer cells to migrate through the tissue and subsequently to spread to secondary sites in the body. In this paper we consider a mathematical model of cancer cell invasion of tissue (extracellular matrix) which focuses on the role of the plasminogen activation system. The model consists of a system of reaction-diffusion-taxis partial differential equations describing the interactions between cancer cells, urokinase plasminogen activator (uPA), uPA inhibitors, plasmin and the host tissue. The focus of the modelling is on the spatio-temporal dynamics of the uPA system and how this influences the migratory properties of the cancer cells through random motility, chemotaxis and haptotaxis. The results obtained from numerical computations carried out on the model equations produce rich, dynamic heterogeneous spatio-temporal solutions and demonstrate the ability of rather simple models to produce complicated dynamics, all of which are associated with tumour heterogeneity and cancer cell progression and invasion.


Author(s):  
Karl E. Misulis ◽  
Mark E. Frisse

Clinical informatics professionals must remain current with rapid changes in technology, expectations, payment methods, organizational management, and regulations. Fundamental principles in medicine, psychology, computer science, informatics, and economics will serve as a vital foundation; the application of these principles through people, organizations, data, processes, and technologies will change with rapidity. Clinical informatics professionals must remain current to understand and implement meaningful next steps as their organizations evolve. This currency can only be obtained through professional engagement with the broader informatics community and through study of new findings and innovations. Like clinical medicine and many other fields, the body of literature in informatics is growing far too rapidly to remain current in every professional interest. To face the challenges ahead, informatics professionals must employ a range of technologies and resources to collaborate and learn across the many applicable disciplines.


2020 ◽  
Vol 39 (3) ◽  
pp. 2783-2790
Author(s):  
Qian Hu ◽  
Ke-Yun Qin

The construction of concept lattices is an important research topic in formal concept analysis. Inspired by multi-granularity rough sets, multi-granularity formal concept analysis has become a new hot research issue. This paper mainly studies the construction methods of concept lattices in multi-granularity formal context. The relationships between concept forming operators under different granularity are discussed. The mutual transformation methods of formal concepts under different granularity are presented. In addition, the approaches of obtaining coarse-granularity concept lattice by fine-granularity concept lattice and fine-granularity concept lattice by coarse-granularity concept lattice are examined. The related algorithms for generating concept lattices are proposed. The practicability of the method is illustrated by an example.


Sign in / Sign up

Export Citation Format

Share Document