Discernibility Matrix Enriching and Boolean-And Algorithm for Attributes Reduction

被引:0
|
作者
Xu, ZhangYan [1 ]
Wang, Ting [1 ]
Zhu, JinHu [1 ]
Zhang, XiaFei [1 ]
机构
[1] Guangxi Normal Univ, Coll Comp Sci & Informat Technol, Guilin 541004, Peoples R China
关键词
Rough set; discernibility matrix; enriching discernibility matrix; Boolean-and; attribute reduction; TREE STRUCTURE; ROUGH;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
discernibility matrix and binary discernibility matrix method is easy to understand and design, which has aroused great concern by many scholar. Research shows that the two methods produce a large number of repeated and useless elements (if A is the subset of B, B is the useless element of A) on the fly. These repeated and useless elements occupy a lot of space and will affect the efficiency of the algorithm. If we delete these elements, the storage is much less than before, and the algorithm will be increased. For this purpose, professor Yang Ming give the definition of enriching discernibility matrix [3], which all the discernibility elements are not repetition and mutually exclusive. Some scholars adopt the method of comparison between every two discernibility elements to get the enriching discernibility matrix. Some present the algorithm, every nonempty entry of a discernibility matrix is stored one path in the enriching tree and a lot of nonempty entries share one path or sub-path. However, these algorithms only delete part of the useless elements in spite of lower storage space. In this paper, we put forward discernibility matrix enriching and Boolean-And algorithm for attributes Reduction. The algorithm is easy to understand and easy to design. The Analysis Experiment and Experimental Comparison show the algorithm is feasible and effective.
引用
收藏
页码:667 / 676
页数:10
相关论文
共 50 条
  • [31] Attribute reduction algorithm Based on a concentration Boolean matrix
    Yin, Zhi-Wei
    Zhang, Jian-Pei
    [J]. Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2009, 30 (03): : 307 - 311
  • [32] An Binary Discernibility Matrix Attribute Reduction Algorithm on Attribute Importance Heuristic Message
    He, Ying
    He, Dan
    [J]. MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES, PTS 1 AND 2, 2011, 480-481 : 1613 - +
  • [33] Applying Restrained Genetic Algorithm for Attribute Reduction Using Attribute Dependency and Discernibility Matrix
    Das, Asit Kumar
    Chakrabarty, Saikat
    Pati, Soumen Kumar
    Sahaji, Ajijul Haque
    [J]. WIRELESS NETWORKS AND COMPUTATIONAL INTELLIGENCE, ICIP 2012, 2012, 292 : 299 - +
  • [34] A New Discernibility Matrix Based on Distribution Reduction
    Wu, HaiTao
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 390 - 393
  • [35] New discernibility matrix and attribute reduction method
    Ge, Hao
    Li, Long-Shu
    Yang, Chuan-Jian
    [J]. Kongzhi yu Juece/Control and Decision, 2010, 25 (12): : 1891 - 1895
  • [36] Algorithm for Decision Rules Reduction in Incomplete Information System Based on Binary Discernibility Matrix
    Bai, Xiuling
    Zhang, Mingchuan
    Qiu, Yong
    Wu, Qingtao
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON MECHATRONICS AND AUTOMATION, VOLS 1-7, CONFERENCE PROCEEDINGS, 2009, : 4061 - 4066
  • [37] Algorithm of Attribute Reduction in Dominance Based Rough Sets Combined with Dominance Discernibility Matrix
    Zhan, Qiang
    [J]. 8TH INTERNATIONAL CONFERENCE ON INTERNET MULTIMEDIA COMPUTING AND SERVICE (ICIMCS2016), 2016, : 66 - 71
  • [38] Efficient attribute reduction based on discernibility matrix
    Xu, Zhangyan
    Zhang, Chengqi
    Zhang, Shichao
    Song, Wei
    Yang, Bingru
    [J]. ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2007, 4481 : 13 - +
  • [39] A feature selection algorithm based on discernibility matrix
    Liu, Fuyan
    Lu, Shaoyi
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 259 - +
  • [40] A discernibility matrix based algorithm for feature selection
    Liu, Fuyan
    [J]. 2006 International Conference on Computational Intelligence and Security, Pts 1 and 2, Proceedings, 2006, : 155 - 158