SlideShare uma empresa Scribd logo
1 de 110
Essays on using Formal Concept Analysis in Information Engineering Jonas Poelmans, Aspirant FWO Katholieke Universiteit Leuven Inno.com February 2011
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Formal Concept Analysis (FCA) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FCA essentials: cross table kicking dad hits me stabbing cursing scratching maltreating Report 1 X X X Report 2 X X X Report 3 X X X X X Report 4 X Report 5 X X
FCA essentials: concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FCA essentials: ordering of concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FCA essentials: lattice
Literature study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Literature study: FCA papers
Literature study: KDD papers
Domestic violence case study ,[object Object],[object Object],[object Object],[object Object]
Emergent Self Organising Map (ESOM) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Concept  - Knowledge theory  ( C-K theory )
Motivation ,[object Object],[object Object],[object Object],[object Object]
Dataset ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Domestic violence definition ,[object Object],[object Object],[object Object],[object Object]
Clustering terms for FCA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Expanding C  C and Transforming C  K ,[object Object],[object Object],[object Object]
Transforming K  C: Initial ESOM map
Expanding C  C and Transforming C  K ,[object Object],[object Object],[object Object]
Expanding K  K: Newly discovered features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Expanding C  C: Identifying faulty case labelling
Expanding C  C: Testing prior knowledge
Expanding C  C: Omitted information
Expanding C  C: Inconsistencies
Expanding C  C: Niche cases
Expanding K  K: Omitted information and faulty case labellings ,[object Object],[object Object],[object Object],[object Object]
Expanding K  K: FCA classification rules
FCA results: classification rules ,[object Object]
FCA results: correct filed report labels
Transforming K  C: Improved ESOM map
Expanding K  K: Confusing situations for police officers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESOM risk classification map
ESOM risk map results: label cases -  Label remaining 78% of incoming cases based on area of map
FCA & ESOM results ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object]
Human trafficking ,[object Object],[object Object],[object Object],[object Object]
Human trafficking (2) ,[object Object],[object Object],[object Object],[object Object]
  Police challenges   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Investigation procedure ,[object Object],[object Object],[object Object]
Dataset ,[object Object],[object Object]
Temporal Concept Analysis (TCA) ,[object Object],[object Object],[object Object],[object Object]
Analysis method ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Human trafficking indicators Static indicators Indicators with time dimension Indicators coming from social network - nationality - red light district: Wallen - seen with known suspect - violence ,[object Object],- minors involved - regularly visiting suspicious club - restriction of personal freedom - regularly dropping of girls at club - id-problems - expensive car - carrying large amount of money - woman in car - forcing person to work in bad condition - prostitute involved - dependency relationship - car trade - injury observed - woman not speaking
Example of a formal context and report  ,[object Object],[object Object],Expensive cars Prostitues Id-papers Vacation Former eastern Europe 1 X X X X x 2 x x x X 3 X X x X 4 x x 5 x X
Detecting possible suspects
Data table of a conceptual time system   Time part Event part Time granule Date Expensive car Prostitution area Vacation 0 26-1-2008 X 1 21-2-2008 X X X 2 15-2-2008 X X 3 13-3-2008 X X 4 27-4-2008 X 5 1-6-2008 X 6 14-6-2008 X 7 18-6-2008 X
Profiling suspects with TCA
Network evolution analysis using TCA
Terrorist threat  assessment with Formal Concept Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
The four phase model of radicalism
The phases explained ,[object Object],[object Object],[object Object],[object Object],Incremental isolation
Indicators and terms Anti western Orthodox religion Change behavior Monkeys; pigs soennah Suddenly wearing beard Imperialists; Zionists fatwa; fatwah no respect colleague Kufar; kufir wahabist islamitic mariage Unbeliever; disbeliever Only and one islam tradional clothes takfir fundamentalist Not shaking hands women
Dataset ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example police report
Example of a formal context for a subject  ,[object Object],[object Object],[object Object],[object Object],Subject Anti western Orthodox religion Change behavior A X X X B x x C X x D x x E x
Example of FCA Lattice
Conceptual time system for a selected subject   Time part Event part Time granule Date Anti western Orthodox religion Change behavior 0 2008-01-26 X 1 2008-02-15 X X 2 2008-02-24 X X 3 2008-03-28 X X 4 2008-04-06 X X 5 2008-01-06 X 6 2008-06-14 X 7 2008-06-18 X
TCA lattice of subject A
Extracting and profiling potential jihadists
Showing the subjects
Profiling subject with TCA
Combining business process & data discovery techniques for analyzing and improving integrated care pathways ,[object Object],[object Object],[object Object],[object Object]
Integrated care pathway (ICP): Definition ,[object Object],[object Object],[object Object],[object Object],[object Object]
ICP’s in GZA hospitals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: Breast Unit St-Augustinus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Healthcare 1.0: Pitfalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Innovation: Process Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
Input for Clinical Path Discovery ,[object Object],[object Object],[object Object]
Expected Benefits of the research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Process Discovery about ?
C/K-Theory: Innovative Discovery
What is Data Discovery about ?
Combination of process & data discovery (1) ,[object Object],[object Object],[object Object]
Combination of process & data discovery (2) ,[object Object],[object Object],[object Object],[object Object]
Previous process mining research in healthcare ,[object Object],[object Object],[object Object]
Hidden Markov Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dataset ,[object Object],[object Object],[object Object],[object Object]
Breast cancer care process (1) ,[object Object],[object Object]
Breast cancer care process (2)
Breast cancer data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Analysis method ,[object Object],[object Object],[object Object]
Quality of care analysis ,[object Object],[object Object],[object Object]
FCA analysis of 12 patients (1) ,[object Object],[object Object],[object Object]
FCA analysis of 12 patients (2)
FCA analysis of 12 patients (3) ,[object Object],[object Object],[object Object]
Process variations (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process variations (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Breast conserving surgery (1)
Breast conserving surgery (2)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Breast conserving surgery (3) ,[object Object],[object Object],[object Object],[object Object]
Breast conserving surgery (4) ,[object Object],[object Object],[object Object]
Mastectomy (1)
Mastectomy (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Workforce intelligence (1)
Workforce intelligence (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process models ML LOW ML AVG ML HIGH
 
Data entrance quality problems ,[object Object],[object Object],[object Object]
Data entrance quality problems (2) ,[object Object],[object Object],[object Object],[object Object]
Journal Articles: Published ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Journal Articles: Published ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Journal Articles: Submitted ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Journal Articles: Submitted ,[object Object],[object Object],[object Object]
Conference proceedings: Accepted ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conference proceedings: Accepted ,[object Object],[object Object],[object Object]
Conference proceeding, book chapter & Dutch publications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Awards ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...javan013
 
TCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendlyTCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendlyDeborah L. Shelton
 
Hong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax TreatiesHong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax TreatiesPanamaLaw
 
Canter and heritage
Canter and heritageCanter and heritage
Canter and heritageHari Louise
 
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...Jonathan Stray
 
CJA 215 Inspiring Innovation/tutorialrank.com
 CJA 215 Inspiring Innovation/tutorialrank.com CJA 215 Inspiring Innovation/tutorialrank.com
CJA 215 Inspiring Innovation/tutorialrank.comjonhson115
 
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. RoessSolution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roessjavan8
 
Week 3 (fallacies) ppt
Week 3 (fallacies) pptWeek 3 (fallacies) ppt
Week 3 (fallacies) pptKok Heng Tan
 
Cja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.comCja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.comStephenson20
 
Final MYS Mock Trial_FINAL
Final MYS Mock Trial_FINALFinal MYS Mock Trial_FINAL
Final MYS Mock Trial_FINALAmanda Langley
 
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...javan9
 
CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   bellflower13
 
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...Scott Raynor
 
Cja 215 Enhance teaching / snaptutorial.com
Cja 215  Enhance teaching / snaptutorial.comCja 215  Enhance teaching / snaptutorial.com
Cja 215 Enhance teaching / snaptutorial.comDavis107a
 

Mais procurados (15)

Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
 
TCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendlyTCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendly
 
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
 
Hong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax TreatiesHong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax Treaties
 
Canter and heritage
Canter and heritageCanter and heritage
Canter and heritage
 
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
 
CJA 215 Inspiring Innovation/tutorialrank.com
 CJA 215 Inspiring Innovation/tutorialrank.com CJA 215 Inspiring Innovation/tutorialrank.com
CJA 215 Inspiring Innovation/tutorialrank.com
 
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. RoessSolution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
 
Week 3 (fallacies) ppt
Week 3 (fallacies) pptWeek 3 (fallacies) ppt
Week 3 (fallacies) ppt
 
Cja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.comCja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.com
 
Final MYS Mock Trial_FINAL
Final MYS Mock Trial_FINALFinal MYS Mock Trial_FINAL
Final MYS Mock Trial_FINAL
 
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
 
CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   
 
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
 
Cja 215 Enhance teaching / snaptutorial.com
Cja 215  Enhance teaching / snaptutorial.comCja 215  Enhance teaching / snaptutorial.com
Cja 215 Enhance teaching / snaptutorial.com
 

Semelhante a Essays on using Formal Concept Analysis in Information Engineering

Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docxAlexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docxADDY50
 
Sexual Assault Training (2017)
Sexual Assault Training (2017)Sexual Assault Training (2017)
Sexual Assault Training (2017)Arete-Zoe, LLC
 
Reasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People FReasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People FLisa Anderson
 
Visual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCIVisual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCIStacey Pereira
 
Personality Disorders as Predictors of Lethal Intimate Partner Violence
Personality Disorders as Predictors of Lethal Intimate   Partner ViolencePersonality Disorders as Predictors of Lethal Intimate   Partner Violence
Personality Disorders as Predictors of Lethal Intimate Partner ViolenceDonna LaPalm
 
4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docx4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docxpriestmanmable
 
Visit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docxVisit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docxwashingtonrosy
 

Semelhante a Essays on using Formal Concept Analysis in Information Engineering (8)

Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docxAlexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
 
Sexual assault (2017)
Sexual assault (2017)Sexual assault (2017)
Sexual assault (2017)
 
Sexual Assault Training (2017)
Sexual Assault Training (2017)Sexual Assault Training (2017)
Sexual Assault Training (2017)
 
Reasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People FReasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People F
 
Visual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCIVisual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCI
 
Personality Disorders as Predictors of Lethal Intimate Partner Violence
Personality Disorders as Predictors of Lethal Intimate   Partner ViolencePersonality Disorders as Predictors of Lethal Intimate   Partner Violence
Personality Disorders as Predictors of Lethal Intimate Partner Violence
 
4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docx4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docx
 
Visit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docxVisit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docx
 

Mais de Witology

Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...Witology
 
Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1Witology
 
Интерактивные общественные советы | Обращение
Интерактивные общественные советы | ОбращениеИнтерактивные общественные советы | Обращение
Интерактивные общественные советы | ОбращениеWitology
 
Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"Witology
 
Отчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрированияОтчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрированияWitology
 
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...Witology
 
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативыОтзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативыWitology
 
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...Witology
 
Программа семинара
Программа семинараПрограмма семинара
Программа семинараWitology
 
Witology company presentation
Witology company presentationWitology company presentation
Witology company presentationWitology
 
Мировой и российский рынки People as the platform
Мировой и российский рынки People as the platformМировой и российский рынки People as the platform
Мировой и российский рынки People as the platformWitology
 
Social Organization
Social OrganizationSocial Organization
Social OrganizationWitology
 
"Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet""Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet"Witology
 
Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей Witology
 
Алгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обученииАлгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обученииWitology
 
Интересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATAИнтересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATAWitology
 
Модели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллектаМодели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллектаWitology
 
Основы теории менеджмента знаний
Основы теории менеджмента знанийОсновы теории менеджмента знаний
Основы теории менеджмента знанийWitology
 
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйствеКорпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйствеWitology
 
Анализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в WitologyАнализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в WitologyWitology
 

Mais de Witology (20)

Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
 
Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1
 
Интерактивные общественные советы | Обращение
Интерактивные общественные советы | ОбращениеИнтерактивные общественные советы | Обращение
Интерактивные общественные советы | Обращение
 
Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"
 
Отчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрированияОтчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрирования
 
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
 
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативыОтзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативы
 
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
 
Программа семинара
Программа семинараПрограмма семинара
Программа семинара
 
Witology company presentation
Witology company presentationWitology company presentation
Witology company presentation
 
Мировой и российский рынки People as the platform
Мировой и российский рынки People as the platformМировой и российский рынки People as the platform
Мировой и российский рынки People as the platform
 
Social Organization
Social OrganizationSocial Organization
Social Organization
 
"Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet""Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet"
 
Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей
 
Алгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обученииАлгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обучении
 
Интересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATAИнтересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATA
 
Модели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллектаМодели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллекта
 
Основы теории менеджмента знаний
Основы теории менеджмента знанийОсновы теории менеджмента знаний
Основы теории менеджмента знаний
 
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйствеКорпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
 
Анализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в WitologyАнализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в Witology
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

Essays on using Formal Concept Analysis in Information Engineering

Notas do Editor

  1. Problem definition The unstructured information within police data stores, an almost unexplored area. Formal Concept Analysis (FCA): The initial theory Domestic violence, a classification case Exploring the domestic cases Results thus far Proposed PhD investigation area’s Classifications and profiles of Terrorism Youth gangs Professional criminals
  2. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  3. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  4. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  5. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  6. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  7. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  8. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  9. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  10. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?