An important issue in Knowledge Discovery in Databases is to allow the discovered knowledge to be as close as possible to natural languages to satisfy user needs with tractability on one hand, and to offer KDD systems...An important issue in Knowledge Discovery in Databases is to allow the discovered knowledge to be as close as possible to natural languages to satisfy user needs with tractability on one hand, and to offer KDD systems robustness on the other hand. At this junction, this paper describes a new concept of linguistic atoms with three digital characteristics: expected value Ex, entropy En, and deviation D. The mathematical description has effectively illtegrated the fuzziness and randomness of linguistic terms in a unified way Based on this model a method of knowledge representation in KDD is developed which bridges the gap between quantitative knowledge and qualitative knowledge. Mapping between quantitatives and qualitatives becomes much easier and interchangeab1e. In order to discover genera1ized knowledge from a database, one may use virtual linguistic terms and cloud transforms for the auto-generation of concept hierarchies to attributes. Predictive data mining with the cloud model is given for implementation. This further illustrates the advantages of this linguistic model in KDD.展开更多
Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics...Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.展开更多
文摘An important issue in Knowledge Discovery in Databases is to allow the discovered knowledge to be as close as possible to natural languages to satisfy user needs with tractability on one hand, and to offer KDD systems robustness on the other hand. At this junction, this paper describes a new concept of linguistic atoms with three digital characteristics: expected value Ex, entropy En, and deviation D. The mathematical description has effectively illtegrated the fuzziness and randomness of linguistic terms in a unified way Based on this model a method of knowledge representation in KDD is developed which bridges the gap between quantitative knowledge and qualitative knowledge. Mapping between quantitatives and qualitatives becomes much easier and interchangeab1e. In order to discover genera1ized knowledge from a database, one may use virtual linguistic terms and cloud transforms for the auto-generation of concept hierarchies to attributes. Predictive data mining with the cloud model is given for implementation. This further illustrates the advantages of this linguistic model in KDD.
基金the financial support from Department of Science and Technology,Government of India under the grant:SR/CSRI/118/2014
文摘Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.