SlideShare a Scribd company logo
Essays on using Formal Concept Analysis in Information Engineering Jonas Poelmans, Aspirant FWO Katholieke Universiteit Leuven Inno.com February 2011
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Formal Concept Analysis (FCA) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FCA essentials: cross table kicking dad hits me stabbing cursing scratching maltreating Report 1 X X X Report 2 X X X Report 3 X X X X X Report 4 X Report 5 X X
FCA essentials: concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FCA essentials: ordering of concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FCA essentials: lattice
Literature study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Literature study: FCA papers
Literature study: KDD papers
Domestic violence case study ,[object Object],[object Object],[object Object],[object Object]
Emergent Self Organising Map (ESOM) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Concept  - Knowledge theory  ( C-K theory )
Motivation ,[object Object],[object Object],[object Object],[object Object]
Dataset ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Domestic violence definition ,[object Object],[object Object],[object Object],[object Object]
Clustering terms for FCA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Expanding C  C and Transforming C  K ,[object Object],[object Object],[object Object]
Transforming K  C: Initial ESOM map
Expanding C  C and Transforming C  K ,[object Object],[object Object],[object Object]
Expanding K  K: Newly discovered features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Expanding C  C: Identifying faulty case labelling
Expanding C  C: Testing prior knowledge
Expanding C  C: Omitted information
Expanding C  C: Inconsistencies
Expanding C  C: Niche cases
Expanding K  K: Omitted information and faulty case labellings ,[object Object],[object Object],[object Object],[object Object]
Expanding K  K: FCA classification rules
FCA results: classification rules ,[object Object]
FCA results: correct filed report labels
Transforming K  C: Improved ESOM map
Expanding K  K: Confusing situations for police officers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESOM risk classification map
ESOM risk map results: label cases -  Label remaining 78% of incoming cases based on area of map
FCA & ESOM results ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object]
Human trafficking ,[object Object],[object Object],[object Object],[object Object]
Human trafficking (2) ,[object Object],[object Object],[object Object],[object Object]
  Police challenges   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Investigation procedure ,[object Object],[object Object],[object Object]
Dataset ,[object Object],[object Object]
Temporal Concept Analysis (TCA) ,[object Object],[object Object],[object Object],[object Object]
Analysis method ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Human trafficking indicators Static indicators Indicators with time dimension Indicators coming from social network - nationality - red light district: Wallen - seen with known suspect - violence ,[object Object],- minors involved - regularly visiting suspicious club - restriction of personal freedom - regularly dropping of girls at club - id-problems - expensive car - carrying large amount of money - woman in car - forcing person to work in bad condition - prostitute involved - dependency relationship - car trade - injury observed - woman not speaking
Example of a formal context and report  ,[object Object],[object Object],Expensive cars Prostitues Id-papers Vacation Former eastern Europe 1 X X X X x 2 x x x X 3 X X x X 4 x x 5 x X
Detecting possible suspects
Data table of a conceptual time system   Time part Event part Time granule Date Expensive car Prostitution area Vacation 0 26-1-2008 X 1 21-2-2008 X X X 2 15-2-2008 X X 3 13-3-2008 X X 4 27-4-2008 X 5 1-6-2008 X 6 14-6-2008 X 7 18-6-2008 X
Profiling suspects with TCA
Network evolution analysis using TCA
Terrorist threat  assessment with Formal Concept Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
The four phase model of radicalism
The phases explained ,[object Object],[object Object],[object Object],[object Object],Incremental isolation
Indicators and terms Anti western Orthodox religion Change behavior Monkeys; pigs soennah Suddenly wearing beard Imperialists; Zionists fatwa; fatwah no respect colleague Kufar; kufir wahabist islamitic mariage Unbeliever; disbeliever Only and one islam tradional clothes takfir fundamentalist Not shaking hands women
Dataset ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example police report
Example of a formal context for a subject  ,[object Object],[object Object],[object Object],[object Object],Subject Anti western Orthodox religion Change behavior A X X X B x x C X x D x x E x
Example of FCA Lattice
Conceptual time system for a selected subject   Time part Event part Time granule Date Anti western Orthodox religion Change behavior 0 2008-01-26 X 1 2008-02-15 X X 2 2008-02-24 X X 3 2008-03-28 X X 4 2008-04-06 X X 5 2008-01-06 X 6 2008-06-14 X 7 2008-06-18 X
TCA lattice of subject A
Extracting and profiling potential jihadists
Showing the subjects
Profiling subject with TCA
Combining business process & data discovery techniques for analyzing and improving integrated care pathways ,[object Object],[object Object],[object Object],[object Object]
Integrated care pathway (ICP): Definition ,[object Object],[object Object],[object Object],[object Object],[object Object]
ICP’s in GZA hospitals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: Breast Unit St-Augustinus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Healthcare 1.0: Pitfalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Innovation: Process Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
Input for Clinical Path Discovery ,[object Object],[object Object],[object Object]
Expected Benefits of the research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Process Discovery about ?
C/K-Theory: Innovative Discovery
What is Data Discovery about ?
Combination of process & data discovery (1) ,[object Object],[object Object],[object Object]
Combination of process & data discovery (2) ,[object Object],[object Object],[object Object],[object Object]
Previous process mining research in healthcare ,[object Object],[object Object],[object Object]
Hidden Markov Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dataset ,[object Object],[object Object],[object Object],[object Object]
Breast cancer care process (1) ,[object Object],[object Object]
Breast cancer care process (2)
Breast cancer data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Analysis method ,[object Object],[object Object],[object Object]
Quality of care analysis ,[object Object],[object Object],[object Object]
FCA analysis of 12 patients (1) ,[object Object],[object Object],[object Object]
FCA analysis of 12 patients (2)
FCA analysis of 12 patients (3) ,[object Object],[object Object],[object Object]
Process variations (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process variations (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Breast conserving surgery (1)
Breast conserving surgery (2)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Breast conserving surgery (3) ,[object Object],[object Object],[object Object],[object Object]
Breast conserving surgery (4) ,[object Object],[object Object],[object Object]
Mastectomy (1)
Mastectomy (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Workforce intelligence (1)
Workforce intelligence (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process models ML LOW ML AVG ML HIGH
 
Data entrance quality problems ,[object Object],[object Object],[object Object]
Data entrance quality problems (2) ,[object Object],[object Object],[object Object],[object Object]
Journal Articles: Published ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Journal Articles: Published ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Journal Articles: Submitted ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Journal Articles: Submitted ,[object Object],[object Object],[object Object]
Conference proceedings: Accepted ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conference proceedings: Accepted ,[object Object],[object Object],[object Object]
Conference proceeding, book chapter & Dutch publications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Awards ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
javan013
 
TCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendlyTCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendlyDeborah L. Shelton
 
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
The Statistical and Applied Mathematical Sciences Institute
 
Hong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax TreatiesHong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax Treaties
PanamaLaw
 
Canter and heritage
Canter and heritageCanter and heritage
Canter and heritageHari Louise
 
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Jonathan Stray
 
CJA 215 Inspiring Innovation/tutorialrank.com
 CJA 215 Inspiring Innovation/tutorialrank.com CJA 215 Inspiring Innovation/tutorialrank.com
CJA 215 Inspiring Innovation/tutorialrank.com
jonhson115
 
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. RoessSolution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
javan8
 
Week 3 (fallacies) ppt
Week 3 (fallacies) pptWeek 3 (fallacies) ppt
Week 3 (fallacies) ppt
Kok Heng Tan
 
Cja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.comCja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.com
Stephenson20
 
Final MYS Mock Trial_FINAL
Final MYS Mock Trial_FINALFinal MYS Mock Trial_FINAL
Final MYS Mock Trial_FINALAmanda Langley
 
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
javan9
 
CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   
bellflower13
 
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...Scott Raynor
 
Cja 215 Enhance teaching / snaptutorial.com
Cja 215  Enhance teaching / snaptutorial.comCja 215  Enhance teaching / snaptutorial.com
Cja 215 Enhance teaching / snaptutorial.com
Davis107a
 

What's hot (15)

Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
Concepts of Programming Languages 10th Edition Robert W. Sebesta Solutions Ma...
 
TCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendlyTCR_AnitaAlvarez_printfriendly
TCR_AnitaAlvarez_printfriendly
 
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
NCCU: Statistics in the Criminal Justice System, Statistical Issues in Forens...
 
Hong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax TreatiesHong Kong Now a Top Jurisdiction--No Tax Treaties
Hong Kong Now a Top Jurisdiction--No Tax Treaties
 
Canter and heritage
Canter and heritageCanter and heritage
Canter and heritage
 
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
Frontiers of Computational Journalism week 5 - Algorithmic Accountability and...
 
CJA 215 Inspiring Innovation/tutorialrank.com
 CJA 215 Inspiring Innovation/tutorialrank.com CJA 215 Inspiring Innovation/tutorialrank.com
CJA 215 Inspiring Innovation/tutorialrank.com
 
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. RoessSolution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
Solution Manual for Traffic Engineering, 4th Edition by Roger P. Roess
 
Week 3 (fallacies) ppt
Week 3 (fallacies) pptWeek 3 (fallacies) ppt
Week 3 (fallacies) ppt
 
Cja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.comCja 215 Enthusiastic Study / snaptutorial.com
Cja 215 Enthusiastic Study / snaptutorial.com
 
Final MYS Mock Trial_FINAL
Final MYS Mock Trial_FINALFinal MYS Mock Trial_FINAL
Final MYS Mock Trial_FINAL
 
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
Solutions Manual for Traffic and Highway Engineering 4th Edition by Garber an...
 
CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   
 
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
Political Interview—Iowa GOP Candidate Quits Senate Race to Become Senator of...
 
Cja 215 Enhance teaching / snaptutorial.com
Cja 215  Enhance teaching / snaptutorial.comCja 215  Enhance teaching / snaptutorial.com
Cja 215 Enhance teaching / snaptutorial.com
 

Similar to Essays on using Formal Concept Analysis in Information Engineering

Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docxAlexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
ADDY50
 
Sexual Assault Training (2017)
Sexual Assault Training (2017)Sexual Assault Training (2017)
Sexual Assault Training (2017)
Arete-Zoe, LLC
 
Sexual assault (2017)
Sexual assault (2017)Sexual assault (2017)
Sexual assault (2017)
Arete-Zoe, LLC
 
Reasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People FReasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People F
Lisa Anderson
 
Visual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCIVisual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCI
Stacey Pereira
 
Personality Disorders as Predictors of Lethal Intimate Partner Violence
Personality Disorders as Predictors of Lethal Intimate   Partner ViolencePersonality Disorders as Predictors of Lethal Intimate   Partner Violence
Personality Disorders as Predictors of Lethal Intimate Partner ViolenceDonna LaPalm
 
4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docx4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docx
priestmanmable
 
Visit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docxVisit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docx
washingtonrosy
 

Similar to Essays on using Formal Concept Analysis in Information Engineering (8)

Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docxAlexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
Alexander LeeDr. Martha ShermanCrim250W2282020 Will .docx
 
Sexual Assault Training (2017)
Sexual Assault Training (2017)Sexual Assault Training (2017)
Sexual Assault Training (2017)
 
Sexual assault (2017)
Sexual assault (2017)Sexual assault (2017)
Sexual assault (2017)
 
Reasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People FReasons To Attend College College Prepares People F
Reasons To Attend College College Prepares People F
 
Visual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCIVisual Presentation Writing 39C UCI
Visual Presentation Writing 39C UCI
 
Personality Disorders as Predictors of Lethal Intimate Partner Violence
Personality Disorders as Predictors of Lethal Intimate   Partner ViolencePersonality Disorders as Predictors of Lethal Intimate   Partner Violence
Personality Disorders as Predictors of Lethal Intimate Partner Violence
 
4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docx4.2Assignment Executive Summary Impacts of VictimizationIm.docx
4.2Assignment Executive Summary Impacts of VictimizationIm.docx
 
Visit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docxVisit How to Recognize Plagiarism (Links to an external site.)Li.docx
Visit How to Recognize Plagiarism (Links to an external site.)Li.docx
 

More from Witology

Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...Witology
 
Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1Witology
 
Интерактивные общественные советы | Обращение
Интерактивные общественные советы | ОбращениеИнтерактивные общественные советы | Обращение
Интерактивные общественные советы | ОбращениеWitology
 
Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"Witology
 
Отчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрированияОтчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрированияWitology
 
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...Witology
 
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативыОтзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативыWitology
 
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...Witology
 
Программа семинара
Программа семинараПрограмма семинара
Программа семинараWitology
 
Witology company presentation
Witology company presentationWitology company presentation
Witology company presentationWitology
 
Мировой и российский рынки People as the platform
Мировой и российский рынки People as the platformМировой и российский рынки People as the platform
Мировой и российский рынки People as the platformWitology
 
Social Organization
Social OrganizationSocial Organization
Social OrganizationWitology
 
"Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet""Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet"
Witology
 
Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей
Witology
 
Алгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обученииАлгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обучении
Witology
 
Интересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATAИнтересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATA
Witology
 
Модели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллектаМодели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллекта
Witology
 
Основы теории менеджмента знаний
Основы теории менеджмента знанийОсновы теории менеджмента знаний
Основы теории менеджмента знанийWitology
 
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйствеКорпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйствеWitology
 
Анализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в WitologyАнализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в Witology
Witology
 

More from Witology (20)

Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
Жизнь как игра. Комментарий Ростислава Яворского о геймификации в журнале "Ко...
 
Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1Интерактивные общественные советы | Приложение 1
Интерактивные общественные советы | Приложение 1
 
Интерактивные общественные советы | Обращение
Интерактивные общественные советы | ОбращениеИнтерактивные общественные советы | Обращение
Интерактивные общественные советы | Обращение
 
Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"Брошюра о проекте "Сбербанк21 Будущее"
Брошюра о проекте "Сбербанк21 Будущее"
 
Отчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрированияОтчет по проекту Совершенствование таможенного администрирования
Отчет по проекту Совершенствование таможенного администрирования
 
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
Промежуточные итоги реализации краудсорсинга в рамках Национальной предприним...
 
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативыОтзывы Рабочей группы в рамках Национальной предпринимательской инициативы
Отзывы Рабочей группы в рамках Национальной предпринимательской инициативы
 
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
Отчет по проекту Поддержка доступа на рынки зарубежных стран и поддержка эк...
 
Программа семинара
Программа семинараПрограмма семинара
Программа семинара
 
Witology company presentation
Witology company presentationWitology company presentation
Witology company presentation
 
Мировой и российский рынки People as the platform
Мировой и российский рынки People as the platformМировой и российский рынки People as the platform
Мировой и российский рынки People as the platform
 
Social Organization
Social OrganizationSocial Organization
Social Organization
 
"Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet""Социально-сетевой анализ форумов при помощи пакета UCINet"
"Социально-сетевой анализ форумов при помощи пакета UCINet"
 
Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей Алгоритмы анализа графов социальных связей
Алгоритмы анализа графов социальных связей
 
Алгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обученииАлгоритмы классификации в машинном обучении
Алгоритмы классификации в машинном обучении
 
Интересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATAИнтересные результаты RUSSIR'11: WEB of DATA
Интересные результаты RUSSIR'11: WEB of DATA
 
Модели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллектаМодели когнитивной психологии и задачи искусственного интеллекта
Модели когнитивной психологии и задачи искусственного интеллекта
 
Основы теории менеджмента знаний
Основы теории менеджмента знанийОсновы теории менеджмента знаний
Основы теории менеджмента знаний
 
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйствеКорпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
Корпусная лингвистика: Проект открытый корпус и применение в народном хозяйстве
 
Анализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в WitologyАнализ формальных понятий: Применение в Witology
Анализ формальных понятий: Применение в Witology
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Essays on using Formal Concept Analysis in Information Engineering

Editor's Notes

  1. Problem definition The unstructured information within police data stores, an almost unexplored area. Formal Concept Analysis (FCA): The initial theory Domestic violence, a classification case Exploring the domestic cases Results thus far Proposed PhD investigation area’s Classifications and profiles of Terrorism Youth gangs Professional criminals
  2. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  3. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  4. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  5. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  6. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  7. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  8. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  9. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?
  10. Most data processing architectures are not suited to cope with the diversity of the police information The information vary from simple traffic offences to complex murder investigations. The consequence is an focus on generic group of structured data into tables, like involved persons. A carefully estimation learns this is only 10 to 20% of the information of the event. This means 80 to 90% percent of the information stays unstructured and unused. Keeping in mind that most managing decisions are based on this 10 to 20% of the structured information, it will be clear much better managing decisions might be made if more unstructured information become structured. Next to this group of information an whole new information flow is rapidly growing: the interactive internet (web 2.0), msn and a very fast growing mountain of confiscated hard disk from suspects. It is estimated that on this moment the total amount of only the confiscated hard disk is 65 terabyte. Most of this hard disks are unexplored, can you imagine if we were able to select the relevant information from this enormous flow?