scholarly journals Uncertainty Measurement for a Set-Valued Information System: Gaussian Kernel Method

Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 199 ◽  
Author(s):  
Jiali He ◽  
Pei Wang ◽  
Zhaowen Li

A set-valued information system (SIS) is the generalization of a single-valued informationsystem. This article explores uncertainty measurement for a SIS by using Gaussian kernel. The fuzzyTcos-equivalence relation lead by a SIS is first obtained by using Gaussian kernel. Then, informationstructures in this SIS are described by set vectors. Next, dependence between information structuresis presented and properties of information structures are investigated. Lastly, uncertainty measuresof a SIS are presented by using its information structures. Moreover, effectiveness analysis is doneto assess the feasibility of our presented measures. The consequence of this article will help usunderstand the intrinsic properties of uncertainty in a SIS.

2021 ◽  
Vol 40 (1) ◽  
pp. 295-317
Author(s):  
Gangqiang Zhang ◽  
Zhaowen Li ◽  
Pengfei Zhang ◽  
Ningxin Xie

An information system as a database that stands for relationships between objects and attributes is an important mathematical model. An image information system is an information system where each of its information values is an image and its information structures embody internal features of this type of information system. Uncertainty measurement is an effective tool for evaluation. This paper explores measures of uncertainty for an information system by using the proposed information structures. The distance between two objects in an image information system is first given. After that, the fuzzy Tcos-equivalence relation, induced by this system by using Gaussian kernel method, is obtained, where Gaussian kernel is based on this distance. Next, information structures of this system are described by set vectors, dependence between information structures is studied and properties of information structures are given by using inclusion degree, and application for information structures and uncertainty measures of an image information system are investigated by the information structures. Moreover, effectiveness analysis is done to show the feasibility of the proposed measures from the angle of statistics. Finally, an application of the proposed measurement for attribute reduction is given. These results will be helpful for understanding the essence of uncertainty in an image information system.


2021 ◽  
Author(s):  
Bin Qin ◽  
Fanping Zeng ◽  
Kesong Yan

Abstract A four-hybrid information system (4HIS) is an information system (IS) where the dataset of object descriptions consists of categorical, boolean, real-valued and missing data or attributes. This paper studies measures of uncertainty for a 4HIS and its application in attribute reduction. The distance function for each type of attribute in a 4HIS is first provided. Then, this distance is used to produce the tolerance relation induced by a given subsystem in a 4HIS. Next, information structure of this subsystem is proposed in terms of a set vector and dependence between information structures is introduced. Moreover, granulation and entropy measures in a 4HIS are investigated on the basis of information structures. In order to verify the feasibility of the proposed measures, effectiveness analysis is performed from a statistical perspective. Finally, an application of the proposed measures for attribute reduction in a 4HIS is given.


2020 ◽  
Vol 39 (5) ◽  
pp. 7843-7862
Author(s):  
Haili Wen ◽  
Fei Xia ◽  
Hongxiang Tang

An information system (IS) is a database that expresses relationships between objects and attributes. An IS with decision attributes is said to be a decision information system (DIS). An incomplete real-valued decision information system (IRVDIS) is a DIS based on incomplete real-valued data. This paper studies three-way decision (3WD) for incomplete real-valued data and its application. In the first place, the distance between two objects on the basis of the conditional attribute set in an IRVDIS is constructed. In the next place, the fuzzy Tcos-equivalence relation on the object set of an IRVDIS is received by means of Gaussian kernel. After that, the decision-theoretic rough set model for an IRVDIS is presented. Furthermore, the 3WD method is proposed based on this model. Lastly, to illustrate the feasibility of the proposed method, an application of the proposed method is given. It is worth mentioning that levels of risk may be determined by thresholds that can be directly acquired according to risk preference of different decision-makers, as well as the decision rule for each decision class under different levels of risk is showed in tabular forms.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 212022-212035
Author(s):  
Lijun Chen ◽  
Shimin Liao ◽  
Ningxin Xie ◽  
Zhaowen Li ◽  
Gangqiang Zhang ◽  
...  

Symmetry ◽  
2021 ◽  
Vol 13 (6) ◽  
pp. 949
Author(s):  
Zhen Li ◽  
Xiaoyan Zhang

As a further extension of the fuzzy set and the intuitive fuzzy set, the interval-valued intuitive fuzzy set (IIFS) is a more effective tool to deal with uncertain problems. However, the classical rough set is based on the equivalence relation, which do not apply to the IIFS. In this paper, we combine the IIFS with the ordered information system to obtain the interval-valued intuitive fuzzy ordered information system (IIFOIS). On this basis, three types of multiple granulation rough set models based on the dominance relation are established to effectively overcome the limitation mentioned above, which belongs to the interdisciplinary subject of information theory in mathematics and pattern recognition. First, for an IIFOIS, we put forward a multiple granulation rough set (MGRS) model from two completely symmetry positions, which are optimistic and pessimistic, respectively. Furthermore, we discuss the approximation representation and a few essential characteristics for the target concept, besides several significant rough measures about two kinds of MGRS symmetry models are discussed. Furthermore, a more general MGRS model named the generalized MGRS (GMGRS) model is proposed in an IIFOIS, and some important properties and rough measures are also investigated. Finally, the relationships and differences between the single granulation rough set and the three types of MGRS are discussed carefully by comparing the rough measures between them in an IIFOIS. In order to better utilize the theory to realistic problems, an actual case shows the methods of MGRS models in an IIFOIS is given in this paper.


Author(s):  
Zhaowen Li ◽  
Zhihong Wang ◽  
Qingguo Li ◽  
Pei Wang ◽  
Ching-Feng Wen

Author(s):  
Mykhailo Strelbitskyi

The article analyzes the functions of the Border Guard Service of Ukraine and its information systems. It is determined that the modernization of the components of the integrated information system causes a violation of the existing system of cyber defense. The analysis of existing approaches to ensuring the protection of information in information systems has shown a sufficiently deep study of research separately for each information system. However, unexperienced features of the interaction of these systems remain, in particular, with the modernization of certain information systems in terms of providing cyber defense in general. The process of modernization of information systems is carried out according to individual components of the system or complex and requires their coordination in the process of joint operation. The article gives the justification of modernization strategies according to the groups of criteria: the level of cyber security, the peculiarities of the functioning of information systems. It is noted that the value of the probability of violating the properties of the information resource varies over the entire period of modernization. Therefore, to choose the strategy of modernization at the value of probability at any time is not correct. It is necessary to take into account the general tendency of the function of changing this probability. The most expedient is the distribution of this group of criteria into three components of the criteria for the level of cyber security: the normative - the criterion in which the current value of the probability of violating cybersecurity does not exceed the given; average - the criterion for which the average probability of a violation of cybersecurity does not exceed the prescribed; weighted - a criterion for which the average weighted probability of cybersecurity violation will not exceed the given. The article presents functional dependencies for determining the probability of cyber security violations for each of the groups. As a result of the study, it was determined that the priority indicator of the effectiveness of the process of modernizing the information systems of the border agency is the maximum value of the probability of violating the properties of information in the process of modernization


Sign in / Sign up

Export Citation Format

Share Document