Startseite Characterization of neighborhood operators based on neighborhood relationships
Artikel Open Access

Characterization of neighborhood operators based on neighborhood relationships

  • Wei Caixin , Wang Pei EMAIL logo , Xu Rongrong und Huang Wanyuan
Veröffentlicht/Copyright: 18. April 2024
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

Neighborhood relationships play a pivotal role in rough set theory, addressing the limitations of equivalence relations. This article focuses on defining upper and lower approximation operators using neighborhood relationships and exploring their properties in terms of serialization, inverse serialization, reflexivity, symmetry, transitivity, and Euclidean relations. Furthermore, a necessary and sufficient condition for the upper approximation operator to function as a topological closure operator is derived. Overall, this research sheds light on the significance of neighborhood relationships and their implications within rough set theory.

1 Introduction

Rough set theory was proposed by Professor Pawlak in 1982 as a new and effective tool for handling imprecise, incomplete, and inconsistent data [13]. In recent years, with the development of technology, rough set theory has been widely applied in various fields such as artificial intelligence, machine learning, data mining, and pattern recognition. It has been continuously optimized, leading to the definition of many effective models. However, scholars found that the rough set of equivalence relations has its limitations. To solve these problems, scholars have defined rough sets based on neighborhood relationships. Neighborhood rough set has become an important branch of rough set. For information systems, a neighborhood relationship is to classify and distinguish the range while keeping its neighborhood range unchanged. The purpose of neighborhood relationship is to standardize the operation rules of neighborhood operators under various constraints and obtain corresponding results.

The process of human understanding various things in the world begins with establishing concepts, from which continuous thinking approximation is conducted. This process ultimately leads to rational judgments and decisions. Pawlak’s rough set has expanded from two aspects: granulation and approximation. Based on human cognitive methods, it has further deepened our understanding of the profound meaning of rough sets over the course of its 40-year development. In 1990, Lin [4] proposed the concept of neighborhood rough sets, using neighborhood relationships as a new granulation method to implement domain approximation. Lin [5] put forward the concept of neighborhood relationship and neighborhood model based on interior point and closure in topology. In decision analysis, relevant scholars introduced the dominance relation rough set model for the problem of ordered classification, which is used for the case that the decision attributes contain ordered structure. Mao et al. [6] researched on attribute reduction under co-occurrence neighborhood relationships. Li and Yang [7] investigated three-way decisions with fuzzy probabilistic covering-based rough sets and their applications in credit evaluation. Qi et al. [8] obtained some neighborhood-related fuzzy covering-based rough set models and their applications for decision-making.

Topology [9] is a very important basic subject in mathematics, which provides a strong foundation in mathematics for the study of other theories. In this article, we discuss some properties of approximation operators with the help of neighborhood relations and prove the conditions under which the topological closure operator holds. From the perspective of closure operator, we prove the relationship between closure operators and neighborhood relations.

Although many generalized rough set models have been proposed. However, the equivalence relation on the universe plays a crucial role in the Pawlak rough set model, but in practical problems, the neighborhood relationship on the universe is not equivalent. Because the application of Pawlak rough set model is limited, it must be generalized. This article studies the rough set model of the general neighborhood relationship.

This article is organized as follows: Section 2 reviews some elementary concepts on relations, defines neighborhood relation, and obtains some interesting results; Section 3 is the core of this article, wherein we introduce the properties of δ ¯ under neighborhoods relationships and obtain the necessity and sufficiency conditions for neighborhood operators to become topological closure operator under condition attribute B ; and Section 4 summarizes this article.

2 Preliminaries

A decision information system is a binary group D S = U , A T D , where U is a non-empty domain, A T is a condition attribute, D is a decision attributes, and A T D = .

U IND ( D ) = { X 1 , X 2 , , X N } represents the division on the domain of discourse induced by the decision attribute D , X i U IND ( D ) , and X i represents the ith decision, 1 i N .

Definition 2.1

Given a decision information system (DIS) B A T , and r 0 , we define

(1) N B = { ( x , y ) U × U B ( x , y ) r } ,

where x , y U , B ( x , y ) represents the distance between x and y under the condition attribute B , and B ( x , y ) = a B ( a ( x ) 2 + a ( y ) 2 ) , where a ( x ) represents the value of x in attribute a .

x U and according to equation (1), we obtain the neighborhood of sample x with respect to B :

(2) N B ( x ) = { y U ( x , y ) N B } ,

where { N B ( x ) : x U } represents a neighborhood granulation result induced by the conditional attribute B , which constitutes the covering of domain U .

Definition 2.2

[10] U is a non-empty set, T 2 U . T is called a topology, if it satisfies the following conditions:

  1. , U T ,

  2. if A , B T , then A B T ,

  3. if T 1 T , then A T 1 A T .

( U , T ) is called a topological space, and each element of T is called an open set of a topological space ( U , T ) . If X U and x X , there exists an open set A T such that x A X , then X is called the open neighborhood of point x . If X is the open neighborhood of point x , then the point x is an inner point of the set X .

If the set X is an open set of topological space, then the complement X of U is a closed set. If the set X is both an open set and a closed set, then X is said to be an open close set.

In a topological space, the closure of the set X is defined as follows:

C l ( X ) = { F F U , X F } .

Definition 2.3

[11] Let N B : U P ( U ) be a neighborhood operator.

  1. For any x U , there exists y U such that y N B ( x ) . That is to say, x U , N B ( x ) . Then, N B is called serial.

  2. For any x U , there exists y U such that x N B ( y ) . That is to say, N B ( U ) = U . Then, N B is called inverse serial.

  3. For any x U , then x N B ( x ) , and N B is called reflexive.

  4. For any x , y U , x N B ( y ) implies y N B ( x ) , and N B is called symmetric.

  5. For any x , y , z U , y N B ( x ) and z N B ( y ) imply z N B ( x ) . Then, N B is called transitive.

  6. For any x , y , z U , y N B ( x ) and z N B ( x ) imply z N B ( x ) . Then, N B is called Euclidean.

Definition 2.4

Let N B and N S be two neighborhood relations on U .

N B N S = { ( x , y ) x N B y x N S y } , N B N S = { ( x , y ) x N B y x N S y } , N B 1 = { ( y , x ) x N B y } , N B = { ( x , y ) ( x , y ) N B } .

They are called the union, intersection, inverse, and complement of N B and N S , respectively.

Obviously, N B is reflexive N B 1 is reflexive. N B is transitive N B 1 is transitive. N B is symmetrical N B = N B 1 . For any neighborhood relation N B on U , N B N B 1 and N B N B 1 are symmetric.

Let N B be a neighborhood relation over U , x , y U , if ( x , y ) N B , then x is the predecessor of y , and y is the successor of x . Record separately as N B p ( y ) and N B s ( x ) . Define:

N B ( x ) = N B s ( x ) N B p ( x ) . N B s ( x ) = y U , ( x , y ) N B . N B p ( x ) = y U , ( x , y ) N B . N B p s ( x ) = N B s N B p ( x ) . N B p s ( x ) = N B s ( x ) N B p ( x ) .

Obviously, these neighborhoods have the following relationships:

N B p s ( x ) N B p ( x ) N B p s ( x ) . N B p s ( x ) N B s ( x ) N B p s ( x ) . N B p ( x ) = N B s 1 ( x ) .

The neighborhood relation N B and the neighborhood operators N B s and N B p can be mutually uniquely determined as follows:

( x , y ) N B x N B p ( y ) y N B s ( x ) .

Theorem 2.5

Let N B and M B be two neighborhood relations on U, then

  1. N B M B x U , N B s ( x ) M B s ( x ) .

  2. ( N B s ) ( x ) = N B s ( x ) .

  3. ( N B s M B s ) ( x ) = N B s ( x ) M B s ( x ) , especially N B p s ( x ) = ( N B s N B s 1 ) ( x ) .

  4. ( N B s M B s ) ( x ) = N B s ( x ) M B s ( x ) , especially N B p s ( x ) = ( N B s N B s 1 ) ( x ) .

Proof

(1) y N B s ( x ) , we have ( x , y ) N B . Since N B M B , thus ( x , y ) M B , we obtain y M B s ( x ) , therefore N B s ( x ) M B s ( x ) . It is similar to prove the converse.

Similarly, (2)–(4) can be obtained.

The properties of neighborhood relations can be described by the following neighborhood operators:

N B is serial x U , N B s ( x ) N B p ( U ) = U .

N B is inverse-serial x U , N B p ( x ) N B s ( U ) = U .

N B is reflexive x U , x N B s ( x ) .

N B is symmetric x , y U , x N B s ( y ) implies y N B s ( x ) .

N B is transitive x , y , z U , y N B s ( x ) and z N B s ( y ) imply z N B s ( x )

x , y U , y N B s ( x ) implies N B s ( y ) N B s ( x ) .

N B is Euclid x , y , z U , y N B s ( x ) and z N B s ( x ) imply z N B s ( x ) .

x , y U , y N B s ( x ) implies N B s ( x ) N B s ( y ) .

3 Main conclusions

Definition 3.1

Let U be a finite non-empty domain and N B be an arbitrary neighborhood relation over U , then ( U , N B ) is called a generalized approximation space by condition attribute B . For any X U , the lower neighborhood operator δ ̲ B and the upper neighborhood operator δ ¯ B of X with respect to B are defined as follows:

δ ̲ B ( X ) = { y U N B ( y ) X } , δ ¯ B ( X ) = { y U N B ( y ) X } .

The positive neighborhood, the negative neighborhood, and the boundary of X with respect to the approximation space ( U , N B ) are defined as follows:

pos B ( X ) = δ ̲ B ( X ) , neg B ( X ) = U δ ¯ B ( X ) , b n B ( X ) = δ ¯ B ( X ) δ ̲ B ( X ) .

When δ ̲ B ( X ) = δ ¯ B ( X ) , X is said to be definable with respect to the approximation space ( U , N B ) ; otherwise, X is said to be rough.

Remark 3.2

If N B is an equivalence relation, then N B s ( x ) is the N B equivalence class and is abbreviated as [ x ] N B , i.e., the equivalence class of x can be regarded as the neighborhood of x , then the obtained lower approximation δ ̲ B ( X ) and upper approximation δ ¯ B ( X ) are the lower approximation R ̲ ( X ) and upper approximation R ¯ ( X ) in the sense of Pawlak.

Obviously, δ ̲ and δ ¯ are operators of P ( U ) P ( U ) .

Theorem 3.3

Let N B be an arbitrary neighborhood relation over the domain U, then the lower and upper approximation operators given by Definition 3.1have the following properties:

  1. δ ̲ B ( X ) = ( δ ¯ B ( X ) ) , δ ¯ B ( X ) = ( δ ̲ B ( X ) ) .

  2. δ ̲ B ( U ) = U , δ ¯ B ( ) = .

  3. δ ̲ B ( X Y ) = δ ̲ B ( X ) δ ̲ B ( Y ) , δ ¯ B ( X Y ) = δ ¯ B ( X ) δ ¯ B ( Y ) .

  4. X Y δ ̲ B ( X ) δ ̲ B ( Y ) , δ ¯ B ( X ) δ ¯ B ( Y ) .

  5. X , Y U , δ ̲ B ( X Y ) δ ̲ B ( X ) δ ̲ B ( Y ) , δ ¯ B ( X Y ) δ ¯ B ( X ) δ ¯ B ( Y ) .

Proof

( 1 ) Since x δ ̲ B ( X ) N B ( x ) X N B ( x ) ( X ) =

x ( δ ¯ B ( X ) ) .

Therefore, δ ̲ B ( X ) = ( δ ¯ B ( X ) ) . It is similar to prove δ ¯ B ( X ) = ( δ ̲ B ( X ) ) .

(2) Since x δ ̲ B ( U ) N B ( x ) U N B ( x ) ( U ) = x U .

Therefore, δ ̲ B ( U ) = U . It is similar to prove δ ¯ B ( ) = ,

(3) Since x δ ̲ B ( X Y ) N B ( x ) X Y N B ( x ) X and N B ( x ) Y .

x δ ̲ B ( X ) and x δ ̲ B ( Y ) .

x δ ̲ B ( X ) δ ̲ B ( Y ) .

Therefore, δ ̲ B ( X Y ) = δ ̲ B ( X ) δ ̲ B ( Y ) . It is similar to prove δ ¯ B ( X Y ) = δ ¯ B ( X ) δ ¯ B ( Y ) .

(4) It can be directly proven by Definition 3.1.

(5) Derived from property (4).□

Remark 3.4

The following example shows that X , Y U , δ ̲ B ( X Y ) δ ̲ B ( X ) δ ̲ B ( Y ) , and δ ¯ B ( X Y ) δ ¯ B ( X ) δ ¯ B ( Y ) may not true.

Example 3.5

Let U = { a , b , c } , N B = { ( a , a ) , ( b , b ) , ( b , a ) , ( c , b ) } , X = { a } , a n d Y = { b , c } . It is easy to obtain δ ̲ B ( X ) δ ̲ B ( Y ) = { c } . But δ ̲ B ( X Y ) = U .

Take A = { a , c } , B = { b , c } , it is not difficult to obtain δ ¯ B ( A B ) = δ ¯ B { c } . However, δ ¯ B ( A ) δ ¯ B ( B ) = { a , b } U = { a , b } .

Theorem 3.6

Let N B be a neighborhood relation over U, the following conditions are equivalent:

  1. N B is serial.

  2. δ ̲ B ( X ) δ ¯ B ( X ) , X U .

  3. δ ̲ B ( ) = .

  4. δ ¯ B ( U ) = U .

Proof

( 1 ) ( 2 ) x δ ̲ B ( X ) , we have N B ( X ) X by Definition 3.1; since N B is serial, we obtain N B ( X ) , hence N B ( X ) X , and thus x δ ¯ B ( X ) , therefore δ ̲ B ( X ) δ ¯ B ( X ) .

( 2 ) ( 1 ) Suppose x U such that N B ( X ) X = , then X U , N B ( X ) X , and from Definition 3.1, we obtain x δ ̲ B ( X ) but N B ( X ) X = , and x δ ¯ B ( X ) is contradictory to ( 2 ) .

( 2 ) ( 3 ) It is obtained by ( 1 ) of Theorem 3.3:

δ ̲ B ( X ) δ ¯ B ( X ) δ ̲ B ( X ) δ ¯ B ( X ) = .

δ ̲ B ( X ) δ ¯ B ( X ) = .

δ ̲ B ( X X ) = .

δ ̲ B ( ) = .

( 3 ) ( 4 ) It is obtained by the dual property ( 1 ) of Theorem 3.3:

δ ̲ B ( ) = δ ̲ B ( ) = δ ̲ B ( U ) = = U .

δ ¯ B ( U ) = U .

Lemma 3.7

Let N B be any neighborhood relation on U ,

δ ¯ B ( { x } ) = N B 1 ( { x } ) = { y U x N B ( y ) } .

Theorem 3.8

Let N B be a neighborhood relation over U, then the following conditions are equivalent:

  1. N B is inverse serial.

  2. δ ¯ B ( { x } ) x U .

  3. N B ( U ) = U .

Proof

Since N B is inverse serial if and only if x U , we have N B 1 ( x ) = N B ( x ) . From Lemma 3.7, and Definition 3.1, we can straight to prove the following theorem.□

Theorem 3.9

Let N B be a neighborhood relation over U, then the following conditions are equivalent:

  1. N B is reflexive.

  2. δ ̲ B ( X ) X X U .

  3. X δ ¯ B ( X ) X U .

Proof

( 1 ) ( 2 ) Let x δ ̲ B ( X ) , then we have N B ( x ) X by Definition 3.1, and since N B is reflexive, we can obtain x N B ( x ) , and thus x X , therefore δ ̲ B ( X ) X .

( 2 ) ( 3 ) X U , δ ̲ B ( X ) ( X ) is obtained by Definition 3.1, and thus X = ( X ) δ ̲ B ( X ) = δ ¯ B ( X ) is known by (1) of Theorem 3.3.

( 3 ) ( 1 ) If (3) holds, then for any x U , there exists a x δ ¯ B ( { x } ) , we obtain x N B ( x ) by Definition 3.1, thus N B is reflexive.□

Theorem 3.10

Let N B be the neighborhood relation on U, then the following conditions are equivalent:

  1. N B is transitive,

  2. δ ̲ B ( X ) δ ̲ B ( δ ̲ B ( X ) ) , X U .

  3. δ ¯ B ( δ ¯ B ( X ) ) δ ¯ B ( X ) , X U .

Proof

( 1 ) ( 2 ) x δ ̲ B ( X ) , we obtain N B ( x ) X by Definition 3.1, y N B ( x ) , thus ( x , y ) N B , we have y N B ( x ) , since N B is transitive, we obtain N B ( y ) N B ( x ) X , therefore N B ( y ) X . From Definition 3.1, we know that y δ ̲ B ( X ) , and by the arbitrariness of y δ ̲ B ( X ) , we obtain N B ( x ) δ ̲ B ( X ) , so we have x δ ̲ B ( δ ̲ B ( X ) ) , therefore (2) is true.

( 2 ) ( 3 ) It is easy to prove by Theorem 3.3:

δ ̲ B ( X ) = δ ¯ B ( X ) , δ ¯ B ( X ) = δ ̲ B ( X )

δ ̲ B ( X ) δ ̲ B ( δ ̲ B ( X ) )

δ ¯ B ( X ) ( δ ¯ B ( δ ¯ B ( X ) ) )

δ ¯ B ( δ ¯ B ( X ) ) δ ¯ B ( X )

( 3 ) ( 1 ) Let y N B ( x ) and z N B ( y ) , NB is transitive, then y δ ( { x } ) B and z N ( { y } ) B and Lemma 3.7.

This shows that N B ( x ) δ ¯ B ( { z } ) , thus x δ ¯ B ( δ ¯ B ( { z } ) ) , and from ( 3 ) , we have x δ ¯ B ( { x } ) , thus z N B ( x ) , so we obtain z N B ( x ) from y N B ( x ) and z N B ( y ) , i.e., N B is transitive.□

Theorem 3.11

Let N B be any neighborhood relation on U, then the following conditions are equivalent:

  1. N B is symmetrical.

  2. X δ ̲ B ( δ ¯ ( X ) ) X U .

  3. δ ¯ B ( δ ̲ B ( X ) ) X X U .

Proof

( 1 ) ( 2 ) x X and y N B ( x ) , since N B is symmetric, x N B ( y ) , therefore x N B ( y ) X . This means that N B ( y ) X , thus y δ ¯ B ( X ) . By the arbitrariness of x N B ( x ) and N B ( x ) δ ¯ B ( X ) , we have X δ ̲ B ( δ ¯ B ( X ) ) .

( 2 ) ( 1 ) For any x , y U and y N B ( x ) , from (2), we obtain x δ ̲ B ( δ ¯ B ( { x } ) ) and N B ( x ) δ ¯ B ( { x } ) by Definition 3.1, since y N B ( x ) , we have y δ ¯ B ( { x } ) , thus N B ( y ) { x } by definition of the upper approximation, so we have x N B ( y ) , therefore N B is symmetric.

( 2 ) ( 3 ) It is obtained by ( 1 ) of Theorem 3.3.□

Theorem 3.12

Let N B be any domain relation on U, then the following conditions are equivalent:

  1. N B is Euclidean.

  2. δ ¯ B ( X ) δ ̲ B ( δ ¯ B ( X ) ) X U .

  3. δ ¯ B ( δ ̲ B ( X ) ) δ ̲ B ( X ) X U .

Proof

( 1 ) ( 2 ) x δ ¯ B ( X ) and from the definition of above approximation, we have N B ( x ) X ; and y N B ( x ) , since N B is Euclidean, we have N B ( x ) N B ( y ) . Combined with N B ( x ) X , it is obtained N B ( y ) X , and then y δ ¯ B ( X ) . From the arbitrariness of y N B ( x ) , we obtain N B ( x ) δ ¯ B ( X ) and x δ ̲ B ( δ ¯ B ( X ) ) , so δ ¯ B ( X ) δ ̲ B ( δ ¯ B ( X ) ) .

( 2 ) ( 1 ) Let y N B ( x ) and z N B ( x ) , and from z N B ( x ) and Lemma 3.7, we obtain x δ ¯ B ( { z } ) . Since ( 2 ) holds, therefore x δ ̲ B δ ¯ B ( { z } ) , we have N B ( x ) δ ¯ B ( { z } ) . Since y N B ( x ) , then y δ ¯ B ( { z } ) , from Lemma 3.7, we obtain z N B ( y ) , thus we obtain z N B ( y ) from y N B ( x ) and z N B ( x ) , i.e., N B is Euclidean.

( 2 ) ( 3 ) It is obvious by Theorem 3.3.□

Theorem 3.13

δ ¯ B is a topological closure operator if and only if N B is serial, reflexive, and transitive relation.

Proof

(1) We prove that if N B is reflexive and transitive relation, then δ ¯ B is a topological closure operator.

X U , if N B is reflexive, we have X δ ¯ B ( X ) by Theorem 3.9. We also obtain δ ¯ B ( X Y ) = δ ¯ B ( X ) δ ¯ B ( Y ) by ( 3 ) of Theorem 3.3. δ ¯ B ( ) = by Definition 3.1. If N B is serial and transitive, then δ ¯ B ( δ ¯ B ( X ) ) δ ¯ B ( X ) by Theorem 3.10, δ ¯ B ( δ ¯ B ( X ) ) δ ¯ B ( X ) is obvious. Thus, δ ¯ B ( δ ¯ B ( X ) ) = δ ¯ B ( X ) . Therefore, δ ¯ B is a topological closure operator.

(2) We shall prove that if δ ¯ B is a topological closure operator, then N B is serial, reflexive, and transitive relation.

X U , X δ ¯ B ( X ) by Theorem 3.9, so N B is reflexive. If δ ¯ B ( δ ¯ B ( X ) = δ ¯ B ( X ) ) , then N B is transitive by Theorem 3.10. δ ¯ B ( ) = δ ̲ B ( ) = , therefore N B is serial by Theorem 3.6.□

4 Conclusion

Topology and neighborhood relation play a very important role in the field of modern intelligence. Therefore, this article gives the definition of neighborhood relation under various conditions. Although we have defined information granules through neighborhood relationships, we do not discuss the base and topology of information particle construction. In addition, what are the connections and differences between the topology content in future work and Theorem 3.13? we will discuss these questions in the future.

  1. Funding information: This work is supported by the Natural Science Foundation of China (No. 12261096) and Guangxi One Thousand Young and Middle-aged College and University Backbone Teachers Cultivation Program (No. [2019] 5).

  2. Author contributions: Wei Caixin completed the proof of the third part of the paper. Xu Rongrong and Wang Wangyuan completed the writing of the introduction and preliminary knowledge. Wang Pei provided writing ideas, checked the proof process, and wrote the conclusion section.

  3. Conflict of interest: All authors declare that there is no conflict of interest regarding the publication of this manuscript. No figure was used for the research described in the article.

  4. Data availability statement: Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

References

[1] Pawlak Z. Rough sets. Int J Inform Comput Sci. 1982;11(1):341–56. 10.1007/BF01001956Suche in Google Scholar

[2] Pawlak Z. Rough set approach to multi-attriute decision analysis. Eur J Operat Res. 1994;77:443–59. 10.1016/0377-2217(94)90415-4Suche in Google Scholar

[3] Kryszkiewicz M. Comparative studies of alternative type of knowledge reduction in inconsistent systems. Int J Intell Sys. 2001;16(1):105–20. 10.1002/1098-111X(200101)16:1<105::AID-INT8>3.0.CO;2-SSuche in Google Scholar

[4] Lin TY. Rough sets, neighborhood systems and approximation. ISMIS 1990: Proceedings of the 5th International Symposium on Methodologies of Intelligent System. Charlotte: Elsevier Science; 1990. p. 19–90. Suche in Google Scholar

[5] Lin TY. Rough sets, neighborhood systems and approximation. World J Surgery. 1986;10(2):189–94. Suche in Google Scholar

[6] Mao ZY, Dou HL, Song JJ, Jiang ZH, Wang PX. Research on attribute reduction under co-occurrence neighborhood relationship. J Nanjing Univ (Natural Science). 2021;57(1):150–9. 10.13232/j.cnki.jnju.2021.01.016. Suche in Google Scholar

[7] Li W, Yang B. Three-way decisions with fuzzy probabilistic covering-based rough sets and their applications in credit evaluation. Appl Soft Comput. 2023;136:110–44. 10.1016/j.asoc.2023.110144Suche in Google Scholar

[8] Qi G, Yang B, Li W. Some neighborhood-related fuzzy covering-based rough set models and their applications for decision making. Inform Sci. 2023;621:799–843. 10.1016/j.ins.2022.11.054Suche in Google Scholar

[9] Engeiking R. General topology. Berline: Heldermann Verlag; 1989. Suche in Google Scholar

[10] Huang J, Jiang DH. Separation of matroid closure operator induced topological space. Cognition Math Practice. 2016;46(9):262–8. Suche in Google Scholar

[11] Zhang WX, Wu WZ, Liang JY, Li DY. Rough set theory and methods. Beijing: Science Press; 2001. p. 41–53. Suche in Google Scholar

Received: 2023-07-21
Revised: 2023-09-13
Accepted: 2023-10-21
Published Online: 2024-04-18

© 2024 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Artikel in diesem Heft

  1. Research Articles
  2. A study on intelligent translation of English sentences by a semantic feature extractor
  3. Detecting surface defects of heritage buildings based on deep learning
  4. Combining bag of visual words-based features with CNN in image classification
  5. Online addiction analysis and identification of students by applying gd-LSTM algorithm to educational behaviour data
  6. Improving multilayer perceptron neural network using two enhanced moth-flame optimizers to forecast iron ore prices
  7. Sentiment analysis model for cryptocurrency tweets using different deep learning techniques
  8. Periodic analysis of scenic spot passenger flow based on combination neural network prediction model
  9. Analysis of short-term wind speed variation, trends and prediction: A case study of Tamil Nadu, India
  10. Cloud computing-based framework for heart disease classification using quantum machine learning approach
  11. Research on teaching quality evaluation of higher vocational architecture majors based on enterprise platform with spherical fuzzy MAGDM
  12. Detection of sickle cell disease using deep neural networks and explainable artificial intelligence
  13. Interval-valued T-spherical fuzzy extended power aggregation operators and their application in multi-criteria decision-making
  14. Characterization of neighborhood operators based on neighborhood relationships
  15. Real-time pose estimation and motion tracking for motion performance using deep learning models
  16. QoS prediction using EMD-BiLSTM for II-IoT-secure communication systems
  17. A novel framework for single-valued neutrosophic MADM and applications to English-blended teaching quality evaluation
  18. An intelligent error correction model for English grammar with hybrid attention mechanism and RNN algorithm
  19. Prediction mechanism of depression tendency among college students under computer intelligent systems
  20. Research on grammatical error correction algorithm in English translation via deep learning
  21. Microblog sentiment analysis method using BTCBMA model in Spark big data environment
  22. Application and research of English composition tangent model based on unsupervised semantic space
  23. 1D-CNN: Classification of normal delivery and cesarean section types using cardiotocography time-series signals
  24. Real-time segmentation of short videos under VR technology in dynamic scenes
  25. Application of emotion recognition technology in psychological counseling for college students
  26. Classical music recommendation algorithm on art market audience expansion under deep learning
  27. A robust segmentation method combined with classification algorithms for field-based diagnosis of maize plant phytosanitary state
  28. Integration effect of artificial intelligence and traditional animation creation technology
  29. Artificial intelligence-driven education evaluation and scoring: Comparative exploration of machine learning algorithms
  30. Intelligent multiple-attributes decision support for classroom teaching quality evaluation in dance aesthetic education based on the GRA and information entropy
  31. A study on the application of multidimensional feature fusion attention mechanism based on sight detection and emotion recognition in online teaching
  32. Blockchain-enabled intelligent toll management system
  33. A multi-weapon detection using ensembled learning
  34. Deep and hand-crafted features based on Weierstrass elliptic function for MRI brain tumor classification
  35. Design of geometric flower pattern for clothing based on deep learning and interactive genetic algorithm
  36. Mathematical media art protection and paper-cut animation design under blockchain technology
  37. Deep reinforcement learning enhances artistic creativity: The case study of program art students integrating computer deep learning
  38. Transition from machine intelligence to knowledge intelligence: A multi-agent simulation approach to technology transfer
  39. Research on the TF–IDF algorithm combined with semantics for automatic extraction of keywords from network news texts
  40. Enhanced Jaya optimization for improving multilayer perceptron neural network in urban air quality prediction
  41. Design of visual symbol-aided system based on wireless network sensor and embedded system
  42. Construction of a mental health risk model for college students with long and short-term memory networks and early warning indicators
  43. Personalized resource recommendation method of student online learning platform based on LSTM and collaborative filtering
  44. Employment management system for universities based on improved decision tree
  45. English grammar intelligent error correction technology based on the n-gram language model
  46. Speech recognition and intelligent translation under multimodal human–computer interaction system
  47. Enhancing data security using Laplacian of Gaussian and Chacha20 encryption algorithm
  48. Construction of GCNN-based intelligent recommendation model for answering teachers in online learning system
  49. Neural network big data fusion in remote sensing image processing technology
  50. Research on the construction and reform path of online and offline mixed English teaching model in the internet era
  51. Real-time semantic segmentation based on BiSeNetV2 for wild road
  52. Online English writing teaching method that enhances teacher–student interaction
  53. Construction of a painting image classification model based on AI stroke feature extraction
  54. Big data analysis technology in regional economic market planning and enterprise market value prediction
  55. Location strategy for logistics distribution centers utilizing improved whale optimization algorithm
  56. Research on agricultural environmental monitoring Internet of Things based on edge computing and deep learning
  57. The application of curriculum recommendation algorithm in the driving mechanism of industry–teaching integration in colleges and universities under the background of education reform
  58. Application of online teaching-based classroom behavior capture and analysis system in student management
  59. Evaluation of online teaching quality in colleges and universities based on digital monitoring technology
  60. Face detection method based on improved YOLO-v4 network and attention mechanism
  61. Study on the current situation and influencing factors of corn import trade in China – based on the trade gravity model
  62. Research on business English grammar detection system based on LSTM model
  63. Multi-source auxiliary information tourist attraction and route recommendation algorithm based on graph attention network
  64. Multi-attribute perceptual fuzzy information decision-making technology in investment risk assessment of green finance Projects
  65. Research on image compression technology based on improved SPIHT compression algorithm for power grid data
  66. Optimal design of linear and nonlinear PID controllers for speed control of an electric vehicle
  67. Traditional landscape painting and art image restoration methods based on structural information guidance
  68. Traceability and analysis method for measurement laboratory testing data based on intelligent Internet of Things and deep belief network
  69. A speech-based convolutional neural network for human body posture classification
  70. The role of the O2O blended teaching model in improving the teaching effectiveness of physical education classes
  71. Genetic algorithm-assisted fuzzy clustering framework to solve resource-constrained project problems
  72. Behavior recognition algorithm based on a dual-stream residual convolutional neural network
  73. Ensemble learning and deep learning-based defect detection in power generation plants
  74. Optimal design of neural network-based fuzzy predictive control model for recommending educational resources in the context of information technology
  75. An artificial intelligence-enabled consumables tracking system for medical laboratories
  76. Utilization of deep learning in ideological and political education
  77. Detection of abnormal tourist behavior in scenic spots based on optimized Gaussian model for background modeling
  78. RGB-to-hyperspectral conversion for accessible melanoma detection: A CNN-based approach
  79. Optimization of the road bump and pothole detection technology using convolutional neural network
  80. Comparative analysis of impact of classification algorithms on security and performance bug reports
  81. Cross-dataset micro-expression identification based on facial ROIs contribution quantification
  82. Demystifying multiple sclerosis diagnosis using interpretable and understandable artificial intelligence
  83. Unifying optimization forces: Harnessing the fine-structure constant in an electromagnetic-gravity optimization framework
  84. E-commerce big data processing based on an improved RBF model
  85. Analysis of youth sports physical health data based on cloud computing and gait awareness
  86. CCLCap-AE-AVSS: Cycle consistency loss based capsule autoencoders for audio–visual speech synthesis
  87. An efficient node selection algorithm in the context of IoT-based vehicular ad hoc network for emergency service
  88. Computer aided diagnoses for detecting the severity of Keratoconus
  89. Improved rapidly exploring random tree using salp swarm algorithm
  90. Network security framework for Internet of medical things applications: A survey
  91. Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model
  92. Enhancing 5G communication in business networks with an innovative secured narrowband IoT framework
  93. Quokka swarm optimization: A new nature-inspired metaheuristic optimization algorithm
  94. Digital forensics architecture for real-time automated evidence collection and centralization: Leveraging security lake and modern data architecture
  95. Image modeling algorithm for environment design based on augmented and virtual reality technologies
  96. Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
  97. High-resolution image processing and entity recognition algorithm based on artificial intelligence
  98. Review Articles
  99. Transformative insights: Image-based breast cancer detection and severity assessment through advanced AI techniques
  100. Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
  101. Applications of integrating artificial intelligence and big data: A comprehensive analysis
  102. A systematic review of symbiotic organisms search algorithm for data clustering and predictive analysis
  103. Modelling Bitcoin networks in terms of anonymity and privacy in the metaverse application within Industry 5.0: Comprehensive taxonomy, unsolved issues and suggested solution
  104. Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
Heruntergeladen am 5.9.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jisys-2023-0100/html
Button zum nach oben scrollen