Approximation of Sets Based on Partial Covering

In this current paper we reveal a mathematical tool that helps us to comprehend certain natural phenomena. The main idea of this tool is a possible generalization of approximations of sets relying on the partial covering of the universe of discourse. Our starting point will be an arbitrary nonempty family B of subsets of an arbitrary nonempty universe U. On the analogy of the definition of Pawlak's type @s-algebra @s(U/@e) over a finite universe, let D"B denote the family of subsets of U which contains the empty set and every set in B and it is closed under unions. However, D"Bneither covers the universe nor is closed under intersections in general. Our notions of lower and upper approximations are straightforward point-free generalizations of Pawlak's same approximations which are imitations of the @e-equivalence class based formulations. Both of them belong to D"B. Our discussion will be within an overall approximation framework along which the common features of rough set theory and our approach can be treated uniformly. To demonstrate the relationship of our approach with natural computing, we will show an example relying on the so-called META program which is a recognition and evaluation program of the actual state of the natural and semi-natural vegetation heritage of Hungary.

[1]  Andrzej Skowron,et al.  Rudiments of rough sets , 2007, Inf. Sci..

[2]  Robert A. Meyers,et al.  Encyclopedia of Complexity and Systems Science , 2009 .

[3]  Yiyu Yao,et al.  On Generalizing Rough Set Theory , 2003, RSFDGrC.

[4]  A. T. Dictionary of Philosophy and Psychology , 1901, Nature.

[5]  Kenneth Revett,et al.  Machine learning in electrocardiogram diagnosis , 2009, 2009 International Multiconference on Computer Science and Information Technology.

[6]  Zdzisław Pawlak,et al.  Rough sets: a new approach to vagueness , 1992 .

[7]  Tsau Young Lin Approximation Theories: Granular Computing vs Rough Sets , 2008, RSCTC.

[8]  Andrzej Bargiela,et al.  The roots of granular computing , 2006, 2006 IEEE International Conference on Granular Computing.

[9]  Ferenc Horváth,et al.  Fact sheet of the MÉTA database 1.2 , 2008 .

[10]  Jorge Horacio Doorn,et al.  Encyclopedia of Database Technologies and Applications , 2005 .

[11]  Yiyu Yao,et al.  On Generalizing Pawlak Approximation Operators , 1998, Rough Sets and Current Trends in Computing.

[12]  Andrzej Skowron,et al.  Information granules: Towards foundations of granular computing , 2001 .

[13]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[14]  Yiyu Yao,et al.  Constructive and Algebraic Methods of the Theory of Rough Sets , 1998, Inf. Sci..

[15]  Guoyin Wang,et al.  Rough Set Based Solutions for Network Security , 2004, MSRAS.

[16]  William Zhu,et al.  Topological approaches to covering rough sets , 2007, Inf. Sci..

[17]  Jouni Järvinen,et al.  Rough Sets Determined by Quasiorders , 2008, Order.

[18]  Jari Kortelainen,et al.  A unifying study between modal-like operators, topologies and fuzzy sets , 2007, Fuzzy Sets Syst..

[19]  A. Miné Weakly Relational Numerical Abstract Domains , 2004 .

[20]  Jouni Järvinen,et al.  Lattice Theory for Rough Sets , 2007, Trans. Rough Sets.

[21]  Jc Beall,et al.  Liars and heaps : new essays on paradox , 2003 .

[22]  Urszula Wybraniec-Skardowska,et al.  Extensions and Intentions in the Ruogh Set Theory , 1998, Inf. Sci..

[23]  Hung Son Nguyen,et al.  Approximate Boolean Reasoning: Foundations and Applications in Data Mining , 2006, Trans. Rough Sets.

[24]  Zoltán Csajbók,et al.  Partial approximative set theory: A generalization of the rough set theory , 2010, 2010 International Conference of Soft Computing and Pattern Recognition.

[25]  Zdzisław Pawlak,et al.  Rough Sets : An Approach to Vagueness , 2006 .

[26]  Yiyu Yao,et al.  Generalization of Rough Sets using Modal Logics , 1996, Intell. Autom. Soft Comput..

[27]  Zoltán Botta-Dukát,et al.  A grid-based, satellite-image supported, multi-attributed vegetation mapping method (MÉTA) , 2007, Folia Geobotanica.

[28]  Klaus Denecke,et al.  Galois connections and applications , 2004 .

[29]  Kenneth Revett,et al.  Feature selection in Parkinson's disease: A rough sets approach , 2009, 2009 International Multiconference on Computer Science and Information Technology.

[30]  Lotfi A. Zadeh Granular Computing and Rough Set Theory , 2007, RSEISP.

[31]  Jouni Järvinen Pawlak's Information Systems in Terms of Galois Connections and Functional Dependencies , 2007, Fundam. Informaticae.

[32]  K. Hofmann,et al.  Continuous Lattices and Domains , 2003 .

[33]  Tsau Young Lin,et al.  Granular Computing: Practices, Theories, and Future Directions , 2009, Encyclopedia of Complexity and Systems Science.

[34]  Zdzislaw Pawlak,et al.  Vagueness - a Rough Set View , 1997, Structures in Logic and Computer Science.

[35]  Ping Zhu,et al.  Covering rough sets based on neighborhoods: An approach without using neighborhoods , 2009, Int. J. Approx. Reason..

[36]  Zoltán Ernő Csajbók On the partial approximation of sets , 2011 .

[37]  Zoltán Ernő Csajbók,et al.  Partial Approximative Set Theory: A View from Galois Connections , 2010 .

[38]  Davide Ciucci,et al.  Approximation Algebra and Framework , 2009, Fundam. Informaticae.

[39]  Yiyu Yao,et al.  Two views of the theory of rough sets in finite universes , 1996, Int. J. Approx. Reason..

[40]  Mihir K. Chakraborty,et al.  A Geometry of Approximation: Rough Set Theory: Logic, Algebra and Topology of Conceptual Patterns , 2008 .

[41]  Zoltán Csajbók,et al.  A security model for personal information security management based on partial approximative set theory , 2010, Proceedings of the International Multiconference on Computer Science and Information Technology.

[42]  Grzegorz Rozenberg,et al.  The many facets of natural computing , 2008, Commun. ACM.

[43]  Hung Son Nguyen,et al.  A View on Rough Set Concept Approximations , 2003, Fundam. Informaticae.

[44]  John M. D. Hunter An Information Security Handbook , 2001, Computer Communications and Networks.

[45]  Jarred Adam Ligatti,et al.  More Enforceable Security Policies , 2002 .

[46]  Achille C. Varzi Cut-offs and their Neighbors , 2003 .

[47]  Zoltán Csajbók,et al.  Simultaneous Anomaly and Misuse Intrusion Detections Based on Partial Approximative Set Theory , 2011, 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing.

[48]  Xiangliang Zhang,et al.  Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data , 2006, Comput. Secur..

[49]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[50]  Andrzej Skowron,et al.  Approximation Spaces and Information Granulation , 2004, Trans. Rough Sets.

[51]  Z. Molnár,et al.  Threatening factors encountered: Actual endangerment of the Hungarian (semi-)natural habitats , 2008 .

[52]  W. Zakowski APPROXIMATIONS IN THE SPACE (U,π) , 1983 .

[53]  Tsau Young Lin Update and Illustration on Granular Computing: Practices, Theory and Future Directions , 2010, 2010 IEEE International Conference on Granular Computing.

[54]  Peter G. Hinman Review: Piergiorgio Odifreddi, Classical Recursion Theory. The Theory of Functions and Sets of Natural Numbers , 1990 .

[55]  Andrzej Skowron,et al.  Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing) , 2005 .

[56]  W. J. Thron,et al.  Encyclopedia of Mathematics and its Applications. , 1982 .

[57]  Tamás Mihálydeák,et al.  General Tool-Based Approximation Framework Based on Partial Approximation of Sets , 2011, RSFDGrC.

[58]  Marcel Erné,et al.  A Primer on Galois Connections , 1993 .

[59]  Ivo Düntsch,et al.  Approximation Operators in Qualitative Data Analysis , 2003, Theory and Applications of Relational Structures as Knowledge Instruments.

[60]  Saso Dzeroski,et al.  Inductive Logic Programming: Techniques and Applications , 1993 .

[61]  William Zhu,et al.  Relationship between generalized rough sets based on binary relation and covering , 2009, Inf. Sci..

[62]  Peter F. Stadler,et al.  Genotype-Phenotype Maps , 2006 .

[63]  Zoltán Csajbók On the mappings of elliptic curves defined over into . , 2007 .

[64]  J. A. Pomykala SOME REMARKS ON APPROXIMATION , 1991 .

[65]  Eszter Illyés,et al.  A NEW HABITAT CLASSIFICATION AND MANUAL FOR STANDARDIZED HABITAT MAPPING , 2007 .

[66]  Rachid Beghdad Modelling and solving the intrusion detection problem in computer networks , 2004, Comput. Secur..

[67]  Jouni Järvinen Properties of Rough Approximations , 2005, J. Adv. Comput. Intell. Intell. Informatics.

[68]  Yiyu Yao,et al.  Rough Set Approximations in Formal Concept Analysis and Knowledge Spaces , 2008, ISMIS.

[69]  Janusz Zalewski,et al.  Rough sets: Theoretical aspects of reasoning about data , 1996 .

[70]  Yiyu Yao,et al.  Rough set approximations in formal concept analysis , 2004, IEEE Annual Meeting of the Fuzzy Information, 2004. Processing NAFIPS '04..

[71]  Andrzej Skowron,et al.  Vague Concepts : A Rough Set Approach , 2004 .

[72]  Z. INFORMATION SYSTEMS THEORETICAL FOUNDATIONS , 2022 .

[73]  Brian A. Davey,et al.  An Introduction to Lattices and Order , 1989 .

[74]  A. Skowron,et al.  On topology in information systems , 1988 .

[75]  Zdzislaw Pawlak,et al.  Some Issues on Rough Sets , 2004, Trans. Rough Sets.

[76]  Zoltán Csajbók Approximation of Sets Based on Partial Covering , 2013, Trans. Rough Sets.

[77]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[78]  Peter F. Smith,et al.  Vagueness: A Reader , 1999 .

[79]  Yiyu Yao,et al.  Information granulation and rough set approximation , 2001, Int. J. Intell. Syst..

[80]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[81]  Jari Kortelainen,et al.  Modal-Like Operators in Boolean Lattices, Galois Connections and Fixed Points , 2007, Fundam. Informaticae.