4.5 Article

A novel granular computing model based on three-way decision

Journal

INTERNATIONAL JOURNAL OF APPROXIMATE REASONING
Volume 144, Issue -, Pages 92-112

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ijar.2022.01.015

Keywords

Granular computing; Three-way decisions; Information granules; Description operator; Attribute reduction; Network security

Funding

  1. National Natural Science Foundation of China [61976245]
  2. Natural Science Foundation of Fujian Province [2020J01707, 2020J01710]
  3. National Fund Cultivation program of Jimei University [ZP2020056, ZP2020063]
  4. Opening Fund of Digital Fujian Big Data Modeling and Intelligent Computing Institute

Ask authors/readers for more resources

Granular computing and three-way decision are important methods in knowledge discovery and data mining. This paper presents a novel granular computing model based on the idea of three-way decision and discusses its mathematical properties. The model is also applied to network security, and algorithms for computing description set, description degree, attribute reduction, and reduction degree are developed. Numerical experiments are conducted to validate the effectiveness of the algorithms and analyze the related factors.
Granular computing and three-way decision are two very important methods in the field of knowledge discovery and data mining. In this paper, based on the idea of three-way decision, all attributes in the information table first are divided into three disjoint parts named indispensable attributes, rejected attributes and neutral attributes, respectively. According to the three parts of attributes, many basic and important information granules and granular structures can be induced from the information table. Then a novel granular computing model is proposed by the description operator. On the one hand, many mathematical properties related to the model proposed in this paper are systematically discussed. On the other hand, we make a preliminary and meaningful attempt to deal with network security by using this model. In addition, in order to apply the model more conveniently, two algorithms for computing description set, description degree, attribute reduction and reduction degree are developed. Finally, through numerical experiments, the validity of the algorithms and the related factors that affect the effectiveness of the algorithms are discussed in detail. (C) 2022 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available