Learn More
Text retrieval using Latent Semantic Indexing (LSI) with truncated Singular Value Decomposition (SVD) has been intensively studied in recent years. However, the expensive complexity involved in computing truncated SVD constitutes a major drawback of the LSI method. In this paper, we demonstrate how matrix rank approximation can influence the effectiveness(More)
Rule acquisition is one of the main purposes in the analysis of decision formal contexts. Up to now, there have existed several types of rules (e.g., the decision rules and the granular rules) in decision formal contexts. This study firstly proposes a new algorithm with less time complexity for deriving the non-redundant decision rules from a decision(More)
Domains such as text, images etc contain large amounts of redundancies and ambiguities among the attributes which result in considerable noise effects (i.e. the data is high dimension). Retrieving the data from high dimensional datasets is a big challenge. Dimensionality reduction techniques have been a successful avenue for automatically extracting the(More)
In this paper our objective is to propose a random projections based formal concept analysis for knowledge discovery in data. We demonstrate the implementation of the proposed method on two real world healthcare datasets. Formal Concept Analysis (FCA) is a mathematical framework that offers a conceptual knowledge representation through hierarchical(More)
Formal Concept Analysis (FCA) with fuzzy setting has been successfully applied by researchers for data analysis and representation. Reducing the number of fuzzy formal concepts and their lattice structure are addressed as a major issues. In this study, we try to link between interval-valued fuzzy graph and fuzzy concept lattice to overcome from the issue.(More)
Keywords: Bipolar fuzzy graph Bipolar information Formal concept analysis Fuzzy concept lattice Fuzzy formal concept a b s t r a c t Formal Concept Analysis (FCA) is a mathematical framework for knowledge processing tasks. FCA has been successfully incorporated into fuzzy setting and its extension (interval valued fuzzy set) for handling vagueness and(More)
Cloud service providers, monitor average resource (for e.g. CPU) consumption and based on predefined limits (for e.g. CPU-Idle-time > 500 milliseconds), provision or de-provision resources. Traditionally this is a reactive approach and doesn't fully address the wide range of enterprise use cases. Implementation of predictive approach to resource(More)
Intrusion detection systems (IDS) play a major role in detecting the attacks that occur in the computer or networks. Anomaly intrusion detection models detect new attacks by observing the deviation from profile. However there are many problems in the traditional IDS such as high false alarm rate, low detection capability against new network attacks and(More)