12 research outputs found

    Fuzzy special logic functions and applications

    Get PDF
    In this thesis, four special logic functions (threshold functions, monotone increasing functions, monotone decreasing functions, and unate functions) are extended to more general functions which allows the activities of these special functions to be a fuzzy rather than a 1-or-O process. These special logic functions are called as fuzzy special logic functions and are based on the concepts and techniques developed in fuzzy logic and fuzzy languages. The algorithms of determining C(n), Cmax(n) and generating the most dissimilar fuzzy special logic functions as well as important properties and results are investigated. Examples are given to illustrated these special logic functions. In addition, their applications -- function representation, data compression, error correction, and monotone flash analog to digital converter, their relationships, and fuzzy classification are also presented. It is obviously shown that fuzzy logic theory can be used successfully on these four special logic functions in order to normalize the grade of membership function μ in the interval [0 1]. As a result, the techniques described in this thesis may be of use in the study of other special logic functions and much fertile field work is great worth researching and developing

    Semantic Biclustering

    Get PDF
    Tato disertační práce se zaměřuje na problém hledání interpretovatelných a prediktivních vzorů, které jsou vyjádřeny formou dvojshluků, se specializací na biologická data. Prezentované metody jsou souhrnně označovány jako sémantické dvojshlukování, jedná se o podobor dolování dat. Termín sémantické dvojshlukování je použit z toho důvodu, že zohledňuje proces hledání koherentních podmnožin řádků a sloupců, tedy dvojshluků, v 2-dimensionální binární matici a zárove ň bere také v potaz sémantický význam prvků v těchto dvojshlucích. Ačkoliv byla práce motivována biologicky orientovanými daty, vyvinuté algoritmy jsou obecně aplikovatelné v jakémkoli jiném výzkumném oboru. Je nutné pouze dodržet požadavek na formát vstupních dat. Disertační práce představuje dva originální a v tomto ohledu i základní přístupy pro hledání sémantických dvojshluků, jako je Bicluster enrichment analysis a Rule a tree learning. Jelikož tyto metody nevyužívají vlastní hierarchické uspořádání termů v daných ontologiích, obecně je běh těchto algoritmů dlouhý čin může docházet k indukci hypotéz s redundantními termy. Z toho důvodu byl vytvořen nový operátor zjemnění. Tento operátor byl včleněn do dobře známého algoritmu CN2, kde zavádí dvě redukční procedury: Redundant Generalization a Redundant Non-potential. Obě procedury pomáhají dramaticky prořezat prohledávaný prostor pravidel a tím umožňují urychlit proces indukce pravidel v porovnání s tradičním operátorem zjemnění tak, jak je původně prezentován v CN2. Celý algoritmus spolu s redukčními metodami je publikován ve formě R balííčku, který jsme nazvali sem1R. Abychom ukázali i možnost praktického užití metody sémantického dvojshlukování na reálných biologických problémech, v disertační práci dále popisujeme a specificky upravujeme algoritmus sem1R pro dv+ úlohy. Zaprvé, studujeme praktickou aplikaci algoritmu sem1R v analýze E-3 ubikvitin ligázy v trávicí soustavě s ohledem na potenciál regenerace tkáně. Zadruhé, kromě objevování dvojshluků v dat ech genové exprese, adaptujeme algoritmus sem1R pro hledání potenciálne patogenních genetických variant v kohortě pacientů.This thesis focuses on the problem of finding interpretable and predic tive patterns, which are expressed in the form of biclusters, with an orientation to biological data. The presented methods are collectively called semantic biclustering, as a subfield of data mining. The term semantic biclustering is used here because it reflects both a process of finding coherent subsets of rows and columns in a 2-dimensional binary matrix and simultaneously takes into account a mutual semantic meaning of elements in such biclusters. In spite of focusing on applications of algorithms in biological data, the developed algorithms are generally applicable to any other research field, there are only limitations on the format of the input data. The thesis introduces two novel, and in that context basic, approaches for finding semantic biclusters, as Bicluster enrichment analysis and Rule and tree learning. Since these methods do not exploit the native hierarchical order of terms of input ontologies, the run-time of algorithms is relatively long in general or an induced hypothesis might have terms that are redundant. For this reason, a new refinement operator has been invented. The refinement operator was incorporated into the well-known CN2 algorithm and uses two reduction procedures: Redundant Generalization and Redundant Non-potential, both of which help to dramatically prune the rule space and consequently, speed-up the entire process of rule induction in comparison with the traditional refinement operator as is presented in CN2. The reduction procedures were published as an R package that we called sem1R. To show a possible practical usage of semantic biclustering in real biological problems, the thesis also describes and specifically adapts the algorithm for two real biological problems. Firstly, we studied a practical application of sem1R algorithm in an analysis of E-3 ubiquitin ligase in the gastrointestinal tract with respect to tissue regeneration potential. Secondly, besides discovering biclusters in gene expression data, we adapted the sem1R algorithm for a different task, concretely for finding potentially pathogenic genetic variants in a cohort of patients

    Dynamically reconfigurable bio-inspired hardware

    Get PDF
    During the last several years, reconfigurable computing devices have experienced an impressive development in their resource availability, speed, and configurability. Currently, commercial FPGAs offer the possibility of self-reconfiguring by partially modifying their configuration bitstream, providing high architectural flexibility, while guaranteeing high performance. These configurability features have received special interest from computer architects: one can find several reconfigurable coprocessor architectures for cryptographic algorithms, image processing, automotive applications, and different general purpose functions. On the other hand we have bio-inspired hardware, a large research field taking inspiration from living beings in order to design hardware systems, which includes diverse topics: evolvable hardware, neural hardware, cellular automata, and fuzzy hardware, among others. Living beings are well known for their high adaptability to environmental changes, featuring very flexible adaptations at several levels. Bio-inspired hardware systems require such flexibility to be provided by the hardware platform on which the system is implemented. In general, bio-inspired hardware has been implemented on both custom and commercial hardware platforms. These custom platforms are specifically designed for supporting bio-inspired hardware systems, typically featuring special cellular architectures and enhanced reconfigurability capabilities; an example is their partial and dynamic reconfigurability. These aspects are very well appreciated for providing the performance and the high architectural flexibility required by bio-inspired systems. However, the availability and the very high costs of such custom devices make them only accessible to a very few research groups. Even though some commercial FPGAs provide enhanced reconfigurability features such as partial and dynamic reconfiguration, their utilization is still in its early stages and they are not well supported by FPGA vendors, thus making their use difficult to include in existing bio-inspired systems. In this thesis, I present a set of architectures, techniques, and methodologies for benefiting from the configurability advantages of current commercial FPGAs in the design of bio-inspired hardware systems. Among the presented architectures there are neural networks, spiking neuron models, fuzzy systems, cellular automata and random boolean networks. For these architectures, I propose several adaptation techniques for parametric and topological adaptation, such as hebbian learning, evolutionary and co-evolutionary algorithms, and particle swarm optimization. Finally, as case study I consider the implementation of bio-inspired hardware systems in two platforms: YaMoR (Yet another Modular Robot) and ROPES (Reconfigurable Object for Pervasive Systems); the development of both platforms having been co-supervised in the framework of this thesis

    Pattern Recognition

    Get PDF
    Pattern recognition is a very wide research field. It involves factors as diverse as sensors, feature extraction, pattern classification, decision fusion, applications and others. The signals processed are commonly one, two or three dimensional, the processing is done in real- time or takes hours and days, some systems look for one narrow object class, others search huge databases for entries with at least a small amount of similarity. No single person can claim expertise across the whole field, which develops rapidly, updates its paradigms and comprehends several philosophical approaches. This book reflects this diversity by presenting a selection of recent developments within the area of pattern recognition and related fields. It covers theoretical advances in classification and feature extraction as well as application-oriented works. Authors of these 25 works present and advocate recent achievements of their research related to the field of pattern recognition

    Condensed-Matter-Principia Based Information & Statistical Measures

    Get PDF
    This book summarizes the efforts of ten papers collected by the Special Issue "Condensed-Matter-Principia Based Information & Statistical Measures: From Classical to Quantum". It calls for papers which deal with condensed-matter systems, or their interdisciplinary analogs, for which well-defined classical–statistical vs. quantum information measures can be inferred while based on the entropy concept. The contents have mainly been rested upon objectives addressed by an international colloquium held on October 2019, in UTP Bydgoszcz, Poland (see http://zmpf.imif.utp.edu.pl/rci-jcs/rci-jcs-4/), with an emphasis placed on the achievements of Professor Gerard Czajkowski, who commenced his research activity with open diffusion–reaction systems under the supervision of Roman S. Ingarden (Toruń), a father of Polish synergetics, and original thermodynamic approaches to self-organization. The active cooperation of Professor Czajkowski, mainly with German physicists (Friedrich Schloegl, Aachen; Werner Ebeling, Berlin), ought to be highlighted. In light of this, a development of his research, as it has moved from statistical thermodynamics to solid state theory, pursued in terms of nonlinear solid-state optics (Franco Bassani, Pisa), and culminated very recently with large quasiparticles termed Rydberg excitons, and their coherent interactions with light, is worth delineating

    A predicated network formalism for commonsense reasoning.

    Get PDF
    Chiu, Yiu Man Edmund.Thesis submitted in: December 1999.Thesis (M.Phil.)--Chinese University of Hong Kong, 2000.Includes bibliographical references (leaves 269-248).Abstracts in English and Chinese.Abstract --- p.iAcknowledgments --- p.iiiChapter 1 --- Introduction --- p.1Chapter 1.1 --- The Beginning Story --- p.2Chapter 1.2 --- Background --- p.3Chapter 1.2.1 --- History of Nonmonotonic Reasoning --- p.3Chapter 1.2.2 --- Formalizations of Nonmonotonic Reasoning --- p.6Chapter 1.2.3 --- Belief Revision --- p.13Chapter 1.2.4 --- Network Representation of Knowledge --- p.17Chapter 1.2.5 --- Reference from Logic Programming --- p.21Chapter 1.2.6 --- Recent Work on Network-type Automatic Reasoning Sys- tems --- p.22Chapter 1.3 --- A Novel Inference Network Approach --- p.23Chapter 1.4 --- Objectives --- p.23Chapter 1.5 --- Organization of the Thesis --- p.24Chapter 2 --- The Predicate Inference Network PIN --- p.25Chapter 2.1 --- Preliminary Terms --- p.26Chapter 2.2 --- Overall Structure --- p.27Chapter 2.3 --- Object Layer --- p.29Chapter 2.3.1 --- Virtual Object --- p.31Chapter 2.4 --- Predicate Layer --- p.33Chapter 2.4.1 --- Node Values --- p.34Chapter 2.4.2 --- Information Source --- p.35Chapter 2.4.3 --- Belief State --- p.36Chapter 2.4.4 --- Predicates --- p.37Chapter 2.4.5 --- Prototypical Predicates --- p.37Chapter 2.4.6 --- Multiple Inputs for a Single Belief --- p.39Chapter 2.4.7 --- External Program Call --- p.39Chapter 2.5 --- Variable Layer --- p.40Chapter 2.6 --- Inter-Layer Links --- p.42Chapter 2.7 --- Chapter Summary --- p.43Chapter 3 --- Computation for PIN --- p.44Chapter 3.1 --- Computation Functions for Propagation --- p.45Chapter 3.1.1 --- Computational Functions for Combinative Links --- p.45Chapter 3.1.2 --- Computational Functions for Alternative Links --- p.49Chapter 3.2 --- Applying the Computation Functions --- p.52Chapter 3.3 --- Relations Represented in PIN --- p.55Chapter 3.3.1 --- Relations Represented by Combinative Links --- p.56Chapter 3.3.2 --- Relations Represented by Alternative Links --- p.59Chapter 3.4 --- Chapter Summary --- p.61Chapter 4 --- Dynamic Knowledge Update --- p.62Chapter 4.1 --- Operations for Knowledge Update --- p.63Chapter 4.2 --- Logical Expression --- p.63Chapter 4.3 --- Applicability of Operators --- p.64Chapter 4.4 --- Add Operation --- p.65Chapter 4.4.1 --- Add a fully instantiated single predicate proposition with no virtual object --- p.66Chapter 4.4.2 --- Add a fully instantiated pure disjunction --- p.68Chapter 4.4.3 --- Add a fully instantiated expression which is a conjunction --- p.71Chapter 4.4.4 --- Add a human biased relation --- p.74Chapter 4.4.5 --- Add a single predicate expression with virtual objects --- p.76Chapter 4.4.6 --- Add a IF-THEN rule --- p.80Chapter 4.5 --- Remove Operation --- p.88Chapter 4.5.1 --- Remove a Belief --- p.88Chapter 4.5.2 --- Remove a Rule --- p.91Chapter 4.6 --- Revise Operation --- p.94Chapter 4.6.1 --- Revise a Belief --- p.94Chapter 4.6.2 --- Revise a Rule --- p.96Chapter 4.7 --- Consistency Maintenance --- p.97Chapter 4.7.1 --- Logical Suppression --- p.98Chapter 4.7.2 --- Example on Handling Inconsistent Information --- p.99Chapter 4.8 --- Chapter Summary --- p.102Chapter 5 --- Knowledge Query --- p.103Chapter 5.1 --- Domains of Quantification --- p.104Chapter 5.2 --- Reasoning through Recursive Rules --- p.109Chapter 5.2.1 --- Infinite Looping Control --- p.110Chapter 5.2.2 --- Proof of the finite termination of recursive rules --- p.111Chapter 5.3 --- Query Functions --- p.117Chapter 5.4 --- Type I Queries --- p.119Chapter 5.4.1 --- Querying a Simple Single Predicate Proposition (Type I) --- p.122Chapter 5.4.2 --- Querying a Belief with Logical Connective(s) (Type I) --- p.128Chapter 5.5 --- Type II Queries --- p.132Chapter 5.5.1 --- Querying Single Predicate Expressions (Type II) --- p.134Chapter 5.5.2 --- Querying an Expression with Logical Connectives (Type II) --- p.143Chapter 5.6 --- Querying an Expression with Virtual Objects --- p.152Chapter 5.6.1 --- Type I Queries Involving Virtual Object --- p.152Chapter 5.6.2 --- Type II Queries involving Virtual Objects --- p.156Chapter 5.7 --- Chapter Summary --- p.157Chapter 6 --- Uniqueness and Finite Termination --- p.159Chapter 6.1 --- Proof Structure --- p.160Chapter 6.2 --- Proof for Completeness and Finite Termination of Domain Search- ing Procedure --- p.161Chapter 6.3 --- Proofs for Type I Queries --- p.167Chapter 6.3.1 --- Proof for Single Predicate Expressions --- p.167Chapter 6.3.2 --- Proof of Type I Queries on Expressions with Logical Con- nectives --- p.172Chapter 6.3.3 --- General Proof for Type I Queries --- p.174Chapter 6.4 --- Proofs for Type II Queries --- p.175Chapter 6.4.1 --- Proof for Type II Queries on Single Predicate Expressions --- p.176Chapter 6.4.2 --- Proof for Type II Queries on Disjunctions --- p.178Chapter 6.4.3 --- Proof for Type II Queries on Conjunctions --- p.179Chapter 6.4.4 --- General Proof for Type II Queries --- p.181Chapter 6.5 --- Proof for Queries Involving Virtual Objects --- p.182Chapter 6.6 --- Uniqueness and Finite Termination of PIN Queries --- p.183Chapter 6.7 --- Chapter Summary --- p.184Chapter 7 --- Lifschitz's Benchmark Problems --- p.185Chapter 7.1 --- Structure --- p.186Chapter 7.2 --- Default Reasoning --- p.186Chapter 7.2.1 --- Basic Default Reasoning --- p.186Chapter 7.2.2 --- Default Reasoning with Irrelevant Information --- p.187Chapter 7.2.3 --- Default Reasoning with Several Defaults --- p.188Chapter 7.2.4 --- Default Reasoning with a Disabled Default --- p.190Chapter 7.2.5 --- Default Reasoning in Open Domain --- p.191Chapter 7.2.6 --- Reasoning about Unknown Exceptions I --- p.193Chapter 7.2.7 --- Reasoning about Unknown Exceptions II --- p.194Chapter 7.2.8 --- Reasoning about Unknown Exceptions III --- p.196Chapter 7.2.9 --- Priorities between Defaults --- p.198Chapter 7.2.10 --- Priorities between Instances of a Default --- p.199Chapter 7.2.11 --- Reasoning about Priorities --- p.199Chapter 7.3 --- Inheritance --- p.200Chapter 7.3.1 --- Linear Inheritance --- p.200Chapter 7.3.2 --- Tree-Structured Inheritance --- p.202Chapter 7.3.3 --- One-Step Multiple Inheritance --- p.203Chapter 7.3.4 --- Multiple Inheritance --- p.204Chapter 7.4 --- Uniqueness of Names --- p.205Chapter 7.4.1 --- Unique Names Hypothesis for Objects --- p.205Chapter 7.4.2 --- Unique Names Hypothesis for Functions --- p.206Chapter 7.5 --- Reasoning about Action --- p.206Chapter 7.6 --- Autoepistemic Reasoning --- p.206Chapter 7.6.1 --- Basic Autoepistemic Reasoning --- p.206Chapter 7.6.2 --- Autoepistemic Reasoning with Incomplete Information --- p.207Chapter 7.6.3 --- Autoepistemic Reasoning with Open Domain --- p.207Chapter 7.6.4 --- Autoepistemic Default Reasoning --- p.208Chapter 8 --- Comparison with PROLOG --- p.214Chapter 8.1 --- Introduction of PROLOG --- p.215Chapter 8.1.1 --- Brief History --- p.215Chapter 8.1.2 --- Structure and Inference --- p.215Chapter 8.1.3 --- Why Compare PIN with Prolog --- p.216Chapter 8.2 --- Representation Power --- p.216Chapter 8.2.1 --- Close World Assumption and Negation as Failure --- p.216Chapter 8.2.2 --- Horn Clauses --- p.217Chapter 8.2.3 --- Quantification --- p.218Chapter 8.2.4 --- Build-in Functions --- p.219Chapter 8.2.5 --- Other Representation Issues --- p.220Chapter 8.3 --- Inference and Query Processing --- p.220Chapter 8.3.1 --- Unification --- p.221Chapter 8.3.2 --- Resolution --- p.222Chapter 8.3.3 --- Computation Efficiency --- p.225Chapter 8.4 --- Knowledge Updating and Consistency Issues --- p.227Chapter 8.4.1 --- PIN and AGM Logic --- p.228Chapter 8.4.2 --- Knowledge Merging --- p.229Chapter 8.5 --- Chapter Summary --- p.229Chapter 9 --- Conclusion and Discussion --- p.230Chapter 9.1 --- Conclusion --- p.231Chapter 9.1.1 --- General Structure --- p.231Chapter 9.1.2 --- Representation Power --- p.231Chapter 9.1.3 --- Inference --- p.232Chapter 9.1.4 --- Dynamic Update and Consistency --- p.233Chapter 9.1.5 --- Soundness and Completeness Versus Efficiency --- p.233Chapter 9.2 --- Discussion --- p.234Chapter 9.2.1 --- Different Selection Criteria --- p.234Chapter 9.2.2 --- Link Order --- p.235Chapter 9.2.3 --- Inheritance Reasoning --- p.236Chapter 9.3 --- Future Work --- p.237Chapter 9.3.1 --- Implementation --- p.237Chapter 9.3.2 --- Application --- p.237Chapter 9.3.3 --- Probabilistic and Fuzzy PIN --- p.238Chapter 9.3.4 --- Temporal Reasoning --- p.238Bibliography --- p.23
    corecore