Skip to main content

Granular Computing and Rough Sets - An Incremental Development

  • Chapter
  • First Online:

Summary

This chapter gives an overview and refinement of recent works on binary granular computing. For comparison and contrasting, granulation and partition are examined in parallel from the prospect of rough Set theory (RST).The key strength of RST is its capability in representing and processing knowledge in table formats. Even though such capabilities, for general granulation, are not available, this chapter illustrates and refines some such capability for binary granulation. In rough set theory, quotient sets, table representations, and concept hierarchy trees are all set theoretical, while in binary granulation, they are special kind of pretopological spaces, which is equivalent to a binary relation Here a pretopological space means a space that is equipped with a neighborhood system (NS). A NS is similar to the classical NS of a topological space, but without any axioms attached to it3.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   349.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Aho, A., Hopcroft, J., and Ullman, J. (1974). The Design and Analysis of Computer Algorithms. Addison-Wesley.

    Google Scholar 

  • Barr, A. and Feigenbaum, E. (1981). The Handbook of Artificial Intelligence. Addison- Wesley.

    Google Scholar 

  • Birkhoff, G. and MacLane, S. (1977). A Survey of Modern Algebra. Macmillan.

    Google Scholar 

  • David D. C. Brewer and Michael J. Nash: ”The Chinese Wall Security Policy” IEEE Symposium on Security and Privacy, Oakland, May, 1988, pp 206-214,

    Google Scholar 

  • Chu W. and Chen Q. (1992), Neighborhood and associative query answering, Journal of. Intelligent Information Systems, 1, 355-382, 1992.

    Article  Google Scholar 

  • Grzymala-Busse, J. W. (2004) Data with missing attribute values: Generalization of idiscernibility relation and rule induction. Transactions on Rough Sets, Lecture Notes in Computer Science Journal Subline, Springer-Verlag, vol. 1 (2004) 78-95.

    Google Scholar 

  • Hobbs, J. (1985). Granularity. In Proceedings of the Ninth Internation Joint Conference on Artificial Intelligence, pages 432–435.

    Google Scholar 

  • Hu X., Lin T.Y., Han J.,(2004) A New Rough Set Model Based on Database Systems, Journalof Fundamental Informatics, Vol. 59, Number 2,3,135-152

    MATH  MathSciNet  Google Scholar 

  • Lee, T. (1983). Algebraic theory of relational databases. The Bell System Technical Journal,62(10):3159–3204.

    MATH  MathSciNet  Google Scholar 

  • Lin, T.Y. (1988). Neighborhood systems and relational database. In Proceedings of CSC’88, page 725.

    Google Scholar 

  • Lin, T.Y. (1989). Neighborhood systems and approximation in database and knowledge base systems. In Proceedings of the Fourth International Symposium on Methodologies of Intelligent Systems (Poster Session), pages 75–86.

    Google Scholar 

  • Lin, T. Y. (1989), ”ChineseWall Security Policy–An Aggressive Model”, Proceedings of the Fifth Aerospace Computer Security Application Conference, December 4-8, 1989, pp. 286-293.

    Google Scholar 

  • Lin, T. Y. (1992) ”Topological and Fuzzy Rough Sets,” in: Decision Support by Experience - Application of the Rough Sets Theory, R. Slowinski (ed.), Kluwer Academic Publishers,1992, 287-304.

    Google Scholar 

  • Lin, T.Y. and Hadjimichael, M. (1996). Non-classificatory generalization in Data Mining. In Proceedings of the 4th Workshop on Rough Sets, Fuzzy Sets, and Machine Discovery, pages 404–412.

    Google Scholar 

  • Lin, T.Y. (1996). A set theory for soft computing. In Proceedings of 1996 IEEE International Conference on Fuzzy Systems, pages 1140–1146.

    Google Scholar 

  • Lin, T.Y. (1998a). Granular computing on binary relations i: Data Mining and neighborhood systems. In Skoworn, A. and Polkowski, L., editors, Rough Sets In Knowledge Discovery, pages 107–121. Physica-Verlag.

    Google Scholar 

  • Lin, T.Y. (1998b). Rough set representations and belief functions ii. In Skoworn, A. and Polkowski, L., editors, Rough Sets In Knowledge Discovery, pages 121–140. Physica- Verlag.

    Google Scholar 

  • Lin, T.Y., Zhong, N., Duong, J., and Ohsuga, S. (1998). Frameworks for mining binary relations in data. In Skoworn, A. and Polkowski, L., editors, Rough sets and Current Trends in Computing, LNCS 1424, pages 387–393. Springer-Verlag.

    Google Scholar 

  • Lin, T.Y. (1999a). Data Mining: Granular computing approach. In Methodologies for Knowledge Discovery and Data Mining: Proceedings of the 3rd Pacific-Asia Conference, LNCS 1574, pages 24–33. Springer-Verlag.

    Google Scholar 

  • Lin, T.Y. (1999b). Granular computing: Fuzzy logic and rough sets. In Zadeh, L. and Kacprzyk, J., editors, Computing with Words in Information/Intelligent Systems, pages 183–200. Physica-Verlag.

    Google Scholar 

  • Lin, T.Y. (2000). Data Mining and machine oriented modeling: A granular computing approach. Journal of Applied Intelligence, 13(2):113–124.

    Article  Google Scholar 

  • Lin, T.Y. (2003a), ”Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses.” In: Data and Applications Security XVII: Status and Prospects,S. Vimercati, I. Ray & I. Ray 9eds) 2004, Kluwer Academic Publishers, 275-297 (Post conference proceedings of IFIP11.3 Working Conference on Database and Application Security, Aug 4-6, 2003, Estes Park, Co, USA

    Google Scholar 

  • Lin, T.Y. (2003b), ”Granular Computing: Structures, Representations, Applications and Future Directions.” In: the Proceedings of 9th International Conference, RSFDGrC 2003, Chongqing, China, May 2003, Lecture Notes on Artificial Intelligence LNAI 2639, Springer-Verlag, 16-24.

    Google Scholar 

  • Lin, T.Y. (2004), ”A Theory of Derived Attributes and Attribute Completion”, Proceedings of IEEE International Conference on Data Mining, Maebashi, Japan, Dec 9-12, 2002.

    Google Scholar 

  • Lin, T.Y. (2005), Granular Computing - Rough Set Perspective, IEEE connections, The newsletter of the IEEE Computational Inelligence Society, Vol 2 Number 4, ISSN 1543- 4281.

    Google Scholar 

  • Liu, Q. (2004) Granular Language and Its Applications in Problem Solving, LNAI 3066,By Springer,127-132.

    Google Scholar 

  • Miyamoto, S. (2004) Generalizations of multisets and rough approximations, International Journal of Intelligent Systems Volume 19, Issue 7, 639-652

    Article  MATH  Google Scholar 

  • Osborn S., Sanghu R. and Munawer Q.,”Configuring RoleBased Access Control to Enforce Mandatory and Discretionary Access Control Policies”, ACM Transaction on Information and Systems Security, Vol 3, No 2, May 2002, Pages 85-106.

    Article  Google Scholar 

  • Pawlak, Z. (1982). Rough sets. International Journal of Information and Computer Science, 11(15):341–356.

    Article  MATH  MathSciNet  Google Scholar 

  • Pawlak, Z. (1991). Rough Sets–Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers.

    Google Scholar 

  • Raghavan, V. V.,Sever, H.,Deogun, J. S. (1995, August), Exploiting Upper Approximations in the Rough Set Model, Proceedings of the First International Conference on Knowl468 Tsau Young (’T. Y.’) Lin and Churn-Jung Liau edge Discovery and Data Mining (KDD’95), Spansored by AAAI in cooperation with IJCAI, Montreal, Quebec, Canada, August, 1995, pp. 69-74.

    Google Scholar 

  • Rokach, L., Averbuch, M., and Maimon, O., Information retrieval system for medical narrative reports. Lecture notes in artificial intelligence, 3055. pp. 217-228, Springer-Verlag (2004).

    Google Scholar 

  • Sierpenski, W. and Krieger, C. (1956). General Topology. University of Toronto Press.

    Google Scholar 

  • Szyperski, C. (2002). Component Software: Beyond Object-Oriented Programming. Addison-Wesley.

    Google Scholar 

  • Wang, D. W.,Liau, C. J.,Hsu, T.-S. (2004), Medical privacy protection based on granular computing, Artificial Intelligence in Medicine, 32(2), 137-149

    Article  Google Scholar 

  • Yao, Y. Y.: Relational interpretations of neighborhood operators and rough set approximation operators. Information Sciences 111 (1998) 239–259.

    Article  MATH  MathSciNet  Google Scholar 

  • Yao, Y. Y. (2004) A partition model of granular computing to appear in LNCS Transactions on Rough Sets.

    Google Scholar 

  • Yao Y.Y. , Zhao Y., Yao J.T., Level Construction of Decision Trees in a Partition-based Framework for Classification, Proceedings of the 16th International Conference on Software Engineering and Knowledge Engineering (SEKE’04), Banff, Alberta, Canada, June 20-24, 2004, pp199-204.

    Google Scholar 

  • Zadeh. L. A. (1973) Outline of a New Approach to the Analysis of Complex Systems and Decision Process. IEEE Trans. Syst. Man.

    Google Scholar 

  • Zadeh, L.A. (1979). Fuzzy sets and information granularity. In Gupta, N., Ragade, R., and Yager, R., editors, Advances in Fuzzy Set Theory and Applications, pages 3–18. North- Holland.

    Google Scholar 

  • Zadeh, L.A. (1996). Fuzzy logic = computing with words. IEEE Transactions on Fuzzy Systems, 4(2):103–111.

    Article  MathSciNet  Google Scholar 

  • Zadeh, L.A. (1997). Towards a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic. Fuzzy Sets and Systems, 19:111–127.

    Article  MathSciNet  Google Scholar 

  • Zadeh, L.A. (1998) Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/ intelligent systems, Soft Computing, 2, 23-25.

    Google Scholar 

  • Zhang, B. and Zhang, L. (1992). Theory and Applications of Problem Solving. North- Holland.

    Google Scholar 

  • Zimmerman, H. (1991). Fuzzy Set Theory –and its Applications. Kluwer Acdamic Publisher.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tsau Young (’T. Y.’) Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

(’T. Y.’) Lin, T.Y., Liau, CJ. (2009). Granular Computing and Rough Sets - An Incremental Development. In: Maimon, O., Rokach, L. (eds) Data Mining and Knowledge Discovery Handbook. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09823-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-09823-4_22

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-09822-7

  • Online ISBN: 978-0-387-09823-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics