Search
Search Results
-
Continuous lattices in formal concept analysis
We introduce the notions of augmented formal contexts and generalized approximable concepts and show that all the generalized approximable concepts...
-
Online rule fusion model based on formal concept analysis
A rule is an effective representation of knowledge in formal concept analysis (FCA), which can express the relations between concepts. One of the...
-
Concept reduction in formal concept analysis based on representative concept matrix
Reduction theory is an important topic in formal concept analysis, and the research of reduction theory generally focuses on attribute reduction....
-
Formal Analysis of 5G EAP-TLS 1.3
As the fifth-generation mobile network communication technology, 5G supports a wider range of application scenarios with faster speed and lower... -
Revisiting data reduction for boolean matrix factorization algorithms based on formal concept analysis
Boolean Matrix Factorization (BMF) helps unveil hidden patterns in boolean datasets and is a powerful tool in machine learning. However, when dealing...
-
Formal Verification of a Dependable State Machine-Based Hardware Architecture for Safety-Critical Cyber-Physical Systems: Analysis, Design, and Implementation
With the increasing interest in embedding digital devices in safety-critical cyber-physical systems (CPSs), such as industrial automation, aerospace,...
-
A representation of L-domain by formal concept analysis
In this paper, we represent L-domains by means of formal concept analysis. Based on the attributive continuous formal contexts, we propose the...
-
A formal security analysis of the fast authentication procedure based on the security context in 5G networks
The security context, generally stored in the universal subscriber identity module card or the baseband chip, is the critical information applied by...
-
Decision Implication-Based Knowledge Representation and Reasoning Within Incomplete Fuzzy Formal Context
Formal Concept Analysis (FCA) is an order theory-based methodology employed for concept analysis and construction. Incomplete fuzzy formal context is...
-
A Tale of Two Automotive Security Services: A Formal Analysis
Automotive system faced in the past decade an abundance of security services proposed by the scientific literature to strengthen their system... -
Non-Invasive Hardware Trojans Modeling and Insertion: A Formal Verification Approach
In modern chip designs, shared resources are used extensively. Arbiters usage is crucial to settle conflicts when multiple requests compete for these...
-
Crafting OWL Ontologies from MongoDB: A Formal Concept Analysis (FCA) Approach
Utilizing ontologies enables the sharing and reuse of knowledge within specific domains. However, develo** an ontology from scratch is a... -
Formal and Non-formal Education of Ukraine: Analysis of the Current State and the Role of Digitalization
The paper offers an analysis of formal and non-formal components of education in the context of digitalization processes, focusing on indicators in... -
A Comparative Analysis of Formal Storytelling Representation Models
This paper presents a comparative analysis of the various formal models that can be used to represent a story. The analysis focuses on two types of... -
Verifying Collision Risk Estimation using Autonomous Driving Scenarios Derived from a Formal Model
Autonomous driving technology is safety-critical and thus requires thorough validation. In particular, the probabilistic algorithms employed in...
-
Characterizing Clarify and Reduce Method by Means of Left-Sided Formal Concept Analysis
Multi-adjoint formal concept analysis is one relevant tool to manage information in databases. Reduce the size of a database is an important issue in... -
Formal Stability Analysis of Two-Dimensional Digital Image Processing Filters
There are several image processing applications that require to partition frequency components of images. This requirement is usually fulfilled by... -
Generalized three-way formal concept lattices
In this paper, a concept generalized three-way concept lattices with respect to double formal contexts is introduced to support the idea of three-way...
-
Formal Analysis of SA-TEK 3-Way Handshake Protocols
IEEE 802.16 is the standard for broadband wireless access. The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access...
-
Formal Security Analysis of Generalized Ultralightweight Mutual Authentication Protocol
IoT network enables the connection of low-cost computing devices, sensors, and actuators to the internet via embedded devices for seamless...