SlideShare une entreprise Scribd logo
1  sur  110
Essays on using Formal Concept Analysis in Information Engineering Jonas Poelmans, Aspirant FWO Katholieke Universiteit Leuven Inno.com February 2011
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Formal Concept Analysis (FCA) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FCA essentials: cross table kicking dad hits me stabbing cursing scratching maltreating Report 1 X X X Report 2 X X X Report 3 X X X X X Report 4 X Report 5 X X
FCA essentials: concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FCA essentials: ordering of concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FCA essentials: lattice
Literature study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Literature study: FCA papers
Literature study: KDD papers
Domestic violence case study ,[object Object],[object Object],[object Object],[object Object]
Emergent Self Organising Map (ESOM) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Concept  - Knowledge theory  ( C-K theory )
Motivation ,[object Object],[object Object],[object Object],[object Object]
Dataset ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Domestic violence definition ,[object Object],[object Object],[object Object],[object Object]
Clustering terms for FCA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Expanding C  C and Transforming C  K ,[object Object],[object Object],[object Object]
Transforming K  C: Initial ESOM map
Expanding C  C and Transforming C  K ,[object Object],[object Object],[object Object]
Expanding K  K: Newly discovered features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Expanding C  C: Identifying faulty case labelling
Expanding C  C: Testing prior knowledge
Expanding C  C: Omitted information
Expanding C  C: Inconsistencies
Expanding C  C: Niche cases
Expanding K  K: Omitted information and faulty case labellings ,[object Object],[object Object],[object Object],[object Object]
Expanding K  K: FCA classification rules
FCA results: classification rules ,[object Object]
FCA results: correct filed report labels
Transforming K  C: Improved ESOM map
Expanding K  K: Confusing situations for police officers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESOM risk classification map
ESOM risk map results: label cases -  Label remaining 78% of incoming cases based on area of map
FCA & ESOM results ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object]
Human trafficking ,[object Object],[object Object],[object Object],[object Object]
Human trafficking (2) ,[object Object],[object Object],[object Object],[object Object]
  Police challenges   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Investigation procedure ,[object Object],[object Object],[object Object]
Dataset ,[object Object],[object Object]
Temporal Concept Analysis (TCA) ,[object Object],[object Object],[object Object],[object Object]
Analysis method ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Human trafficking indicators Static indicators Indicators with time dimension Indicators coming from social network - nationality - red light district: Wallen - seen with known suspect - violence ,[object Object],- minors involved - regularly visiting suspicious club - restriction of personal freedom - regularly dropping of girls at club - id-problems - expensive car - carrying large amount of money - woman in car - forcing person to work in bad condition - prostitute involved - dependency relationship - car trade - injury observed - woman not speaking
Example of a formal context and report  ,[object Object],[object Object],Expensive cars Prostitues Id-papers Vacation Former eastern Europe 1 X X X X x 2 x x x X 3 X X x X 4 x x 5 x X
Detecting possible suspects
Data table of a conceptual time system   Time part Event part Time granule Date Expensive car Prostitution area Vacation 0 26-1-2008 X 1 21-2-2008 X X X 2 15-2-2008 X X 3 13-3-2008 X X 4 27-4-2008 X 5 1-6-2008 X 6 14-6-2008 X 7 18-6-2008 X
Profiling suspects with TCA
Network evolution analysis using TCA
Terrorist threat  assessment with Formal Concept Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
The four phase model of radicalism
The phases explained ,[object Object],[object Object],[object Object],[object Object],Incremental isolation
Indicators and terms Anti western Orthodox religion Change behavior Monkeys; pigs soennah Suddenly wearing beard Imperialists; Zionists fatwa; fatwah no respect colleague Kufar; kufir wahabist islamitic mariage Unbeliever; disbeliever Only and one islam tradional clothes takfir fundamentalist Not shaking hands women
Dataset ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example police report
Example of a formal context for a subject  ,[object Object],[object Object],[object Object],[object Object],Subject Anti western Orthodox religion Change behavior A X X X B x x C X x D x x E x
Example of FCA Lattice
Conceptual time system for a selected subject   Time part Event part Time granule Date Anti western Orthodox religion Change behavior 0 2008-01-26 X 1 2008-02-15 X X 2 2008-02-24 X X 3 2008-03-28 X X 4 2008-04-06 X X 5 2008-01-06 X 6 2008-06-14 X 7 2008-06-18 X
TCA lattice of subject A
Extracting and profiling potential jihadists
Showing the subjects
Profiling subject with TCA
Combining business process & data discovery techniques for analyzing and improving integrated care pathways ,[object Object],[object Object],[object Object],[object Object]
Integrated care pathway (ICP): Definition ,[object Object],[object Object],[object Object],[object Object],[object Object]
ICP’s in GZA hospitals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: Breast Unit St-Augustinus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Healthcare 1.0: Pitfalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Innovation: Process Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
Input for Clinical Path Discovery ,[object Object],[object Object],[object Object]
Expected Benefits of the research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Process Discovery about ?
C/K-Theory: Innovative Discovery
What is Data Discovery about ?
Combination of process & data discovery (1) ,[object Object],[object Object],[object Object]
Combination of process & data discovery (2) ,[object Object],[object Object],[object Object],[object Object]
Previous process mining research in healthcare ,[object Object],[object Object],[object Object]
Hidden Markov Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dataset ,[object Object],[object Object],[object Object],[object Object]
Breast cancer care process (1) ,[object Object],[object Object]
Breast cancer care process (2)
Breast cancer data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Analysis method ,[object Object],[object Object],[object Object]
Quality of care analysis ,[object Object],[object Object],[object Object]
FCA analysis of 12 patients (1) ,[object Object],[object Object],[object Object]
FCA analysis of 12 patients (2)
FCA analysis of 12 patients (3) ,[object Object],[object Object],[object Object]
Process variations (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process variations (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Breast conserving surgery (1)
Breast conserving surgery (2)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Breast conserving surgery (3) ,[object Object],[object Object],[object Object],[object Object]
Breast conserving surgery (4) ,[object Object],[object Object],[object Object]
Mastectomy (1)
Mastectomy (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Workforce intelligence (1)
Workforce intelligence (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process models ML LOW ML AVG ML HIGH
 
Data entrance quality problems ,[object Object],[object Object],[object Object]
Data entrance quality problems (2) ,[object Object],[object Object],[object Object],[object Object]
Journal Articles: Published ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Journal Articles: Published ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Journal Articles: Submitted ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Journal Articles: Submitted ,[object Object],[object Object],[object Object]
Conference proceedings: Accepted ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conference proceedings: Accepted ,[object Object],[object Object],[object Object]
Conference proceeding, book chapter & Dutch publications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Awards ,[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...javan013
 
TCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendlyTCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendlyDeborah L. Shelton
 
Hong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax TreatiesHong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax TreatiesPanamaLaw
 
Canter and heritage
Canter and heritageCanter and heritage
Canter and heritageHari Louise
 
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...Jonathan Stray
 
CJA 215 Inspiring Innovation/tutorialrank.com
 CJA 215 Inspiring Innovation/tutorialrank.com CJA 215 Inspiring Innovation/tutorialrank.com
CJA 215 Inspiring Innovation/tutorialrank.comjonhson115
 
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. RoessSolution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roessjavan8
 
Week 3 (fallacies) ppt
Week 3 (fallacies) pptWeek 3 (fallacies) ppt
Week 3 (fallacies) pptKok Heng Tan
 
Cja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.comCja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.comStephenson20
 
Final MYS Mock Trial_FINAL
Final MYS Mock Trial_FINALFinal MYS Mock Trial_FINAL
Final MYS Mock Trial_FINALAmanda Langley
 
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...javan9
 
CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   bellflower13
 
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...Scott Raynor
 
Cja 215 Enhance teaching / snaptutorial.com
Cja 215  Enhance teaching / snaptutorial.comCja 215  Enhance teaching / snaptutorial.com
Cja 215 Enhance teaching / snaptutorial.comDavis107a
 

Tendances (15)

Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
 
TCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendlyTCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendly
 
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
 
Hong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax TreatiesHong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax Treaties
 
Canter and heritage
Canter and heritageCanter and heritage
Canter and heritage
 
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
 
CJA 215 Inspiring Innovation/tutorialrank.com
 CJA 215 Inspiring Innovation/tutorialrank.com CJA 215 Inspiring Innovation/tutorialrank.com
CJA 215 Inspiring Innovation/tutorialrank.com
 
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. RoessSolution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
 
Week 3 (fallacies) ppt
Week 3 (fallacies) pptWeek 3 (fallacies) ppt
Week 3 (fallacies) ppt
 
Cja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.comCja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.com
 
Final MYS Mock Trial_FINAL
Final MYS Mock Trial_FINALFinal MYS Mock Trial_FINAL
Final MYS Mock Trial_FINAL
 
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
 
CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   
 
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
 
Cja 215 Enhance teaching / snaptutorial.com
Cja 215  Enhance teaching / snaptutorial.comCja 215  Enhance teaching / snaptutorial.com
Cja 215 Enhance teaching / snaptutorial.com
 

Similaire à Essays on using Formal Concept Analysis in Information Engineering

Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docxAlexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docxADDY50
 
Sexual Assault Training (2017)
Sexual Assault Training (2017)Sexual Assault Training (2017)
Sexual Assault Training (2017)Arete-Zoe, LLC
 
Reasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People FReasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People FLisa Anderson
 
Visual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCIVisual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCIStacey Pereira
 
Personality Disorders as Predictors of Lethal Intimate Partner Violence
Personality Disorders as Predictors of Lethal Intimate   Partner ViolencePersonality Disorders as Predictors of Lethal Intimate   Partner Violence
Personality Disorders as Predictors of Lethal Intimate Partner ViolenceDonna LaPalm
 
4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docx4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docxpriestmanmable
 
Visit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docxVisit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docxwashingtonrosy
 

Similaire à Essays on using Formal Concept Analysis in Information Engineering (8)

Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docxAlexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
 
Sexual assault (2017)
Sexual assault (2017)Sexual assault (2017)
Sexual assault (2017)
 
Sexual Assault Training (2017)
Sexual Assault Training (2017)Sexual Assault Training (2017)
Sexual Assault Training (2017)
 
Reasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People FReasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People F
 
Visual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCIVisual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCI
 
Personality Disorders as Predictors of Lethal Intimate Partner Violence
Personality Disorders as Predictors of Lethal Intimate   Partner ViolencePersonality Disorders as Predictors of Lethal Intimate   Partner Violence
Personality Disorders as Predictors of Lethal Intimate Partner Violence
 
4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docx4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docx
 
Visit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docxVisit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docx
 

Plus de Witology

Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...Witology
 
Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1Witology
 
Интерактивные общественные советы | Обращение
Интерактивные общественные советы | ОбращениеИнтерактивные общественные советы | Обращение
Интерактивные общественные советы | ОбращениеWitology
 
Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"Witology
 
Отчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрированияОтчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрированияWitology
 
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...Witology
 
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативыОтзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативыWitology
 
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...Witology
 
Программа семинара
Программа семинараПрограмма семинара
Программа семинараWitology
 
Witology company presentation
Witology company presentationWitology company presentation
Witology company presentationWitology
 
Мировой и российский рынки People as the platform
Мировой и российский рынки People as the platformМировой и российский рынки People as the platform
Мировой и российский рынки People as the platformWitology
 
Social Organization
Social OrganizationSocial Organization
Social OrganizationWitology
 
"Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet""Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet"Witology
 
Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей Witology
 
Алгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обученииАлгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обученииWitology
 
Интересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATAИнтересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATAWitology
 
Модели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллектаМодели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллектаWitology
 
Основы теории менеджмента знаний
Основы теории менеджмента знанийОсновы теории менеджмента знаний
Основы теории менеджмента знанийWitology
 
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйствеКорпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйствеWitology
 
Анализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в WitologyАнализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в WitologyWitology
 

Plus de Witology (20)

Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
 
Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1
 
Интерактивные общественные советы | Обращение
Интерактивные общественные советы | ОбращениеИнтерактивные общественные советы | Обращение
Интерактивные общественные советы | Обращение
 
Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"
 
Отчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрированияОтчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрирования
 
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
 
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативыОтзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативы
 
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
 
Программа семинара
Программа семинараПрограмма семинара
Программа семинара
 
Witology company presentation
Witology company presentationWitology company presentation
Witology company presentation
 
Мировой и российский рынки People as the platform
Мировой и российский рынки People as the platformМировой и российский рынки People as the platform
Мировой и российский рынки People as the platform
 
Social Organization
Social OrganizationSocial Organization
Social Organization
 
"Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet""Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet"
 
Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей
 
Алгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обученииАлгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обучении
 
Интересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATAИнтересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATA
 
Модели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллектаМодели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллекта
 
Основы теории менеджмента знаний
Основы теории менеджмента знанийОсновы теории менеджмента знаний
Основы теории менеджмента знаний
 
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйствеКорпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
 
Анализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в WitologyАнализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в Witology
 

Dernier

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Dernier (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Essays on using Formal Concept Analysis in Information Engineering

Notes de l'éditeur

  1. Problem definition The unstructured information within police data stores, an almost unexplored area. Formal Concept Analysis (FCA): The initial theory Domestic violence, a classification case Exploring the domestic cases Results thus far Proposed PhD investigation area’s Classifications and profiles of Terrorism Youth gangs Professional criminals
  2. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  3. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  4. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  5. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  6. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  7. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  8. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  9. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  10. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?