General Tool-Based Approximation Framework Based on Partial Approximation of Sets

Let us assume that we observe a class of objects and have some well-defined features with which an observed object possesses or not. In real life, two relevant groups of objects can be established determined by our current and necessarily constrained knowledge. In particular, a group whose elements really possess a feature in question, and another group whose elements substantially do not possess the same feature. In practice, as a rule, we can observe a feature of objects via only tools with which we are able to judge easily whether an object possesses a property or not. Of course, a property ascertained by tools does not coincide with a feature completely. To manage this problem, we propose a general tool-based approximation framework based on partial approximation of sets in which a positive feature and its negative one of any proportion of the observed objects can simultaneously be approximated.

[1]  Andrzej Skowron,et al.  Rudiments of rough sets , 2007, Inf. Sci..

[2]  Jerzy W. Grzymala-Busse,et al.  Transactions on Rough Sets VI, Commemorating the Life and Work of Zdzislaw Pawlak, Part I , 2007, Trans. Rough Sets.

[3]  Zdzisław Pawlak,et al.  Rough sets: a new approach to vagueness , 1992 .

[4]  Zoltán Csajbók,et al.  Simultaneous Anomaly and Misuse Intrusion Detections Based on Partial Approximative Set Theory , 2011, 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing.

[5]  Victor W. Marek,et al.  Approximation Schemes in Logic and Artificial Intelligence , 2008, Trans. Rough Sets.

[6]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[7]  Jouni Järvinen,et al.  Lattice Theory for Rough Sets , 2007, Trans. Rough Sets.

[8]  Yiyu Yao,et al.  On Generalizing Rough Set Theory , 2003, RSFDGrC.

[9]  P. Odifreddi The theory of functions and sets of natural numbers , 1989 .

[10]  Jorge Horacio Doorn,et al.  Encyclopedia of Database Technologies and Applications , 2005 .

[11]  P. Odifreddi Classical recursion theory , 1989 .

[12]  Zoltán Csajbók,et al.  A security model for personal information security management based on partial approximative set theory , 2010, Proceedings of the International Multiconference on Computer Science and Information Technology.

[13]  R. Keefe Theories of vagueness , 2000 .

[14]  Jerzy W. Grzymala-Busse,et al.  Rough Sets , 1995, Commun. ACM.

[15]  Z. Pawlak Rough Sets: Theoretical Aspects of Reasoning about Data , 1991 .

[16]  Saso Dzeroski,et al.  Inductive Logic Programming: Techniques and Applications , 1993 .

[17]  Zoltán Csajbók,et al.  Partial approximative set theory: A generalization of the rough set theory , 2010, 2010 International Conference of Soft Computing and Pattern Recognition.

[18]  Andrzej Skowron,et al.  Transactions on Rough Sets IX , 2008, Trans. Rough Sets.