• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Shuying, Li Mei, Jiang Yuncheng, Wang Ju, Liu Zhenhuan. Fuzzy Description Logic L-ALCN[J]. Journal of Computer Research and Development, 2008, 45(4): 619-625.
Citation: Li Shuying, Li Mei, Jiang Yuncheng, Wang Ju, Liu Zhenhuan. Fuzzy Description Logic L-ALCN[J]. Journal of Computer Research and Development, 2008, 45(4): 619-625.

Fuzzy Description Logic L-ALCN

More Information
  • Published Date: April 14, 2008
  • Description logics are a logical reconstruction of the frame-based knowledge representation languages, with the aim of providing a simple well-established declarative semantics to capture the meaning of structured representation of knowledge. In order to make description logics deal with more general fuzzy information, U. Straccia has presented a fuzzy description logic L-ALC based on a certainty lattice. Based on the work of U. Straccia, a new description logic L-ALCN with the constructor of unqualified number restriction is proposed in this paper, and the syntax of L-ALCN and the semantics of the two concept (≥n R) and (≤n R) are defined. In classical description logics, when the constructor of unqualified number restriction is introduced, the role R has more than one successor. Because the description logic based on certainty lattice L-ALCN contains the constructor of unqualified number restriction, so the value of the assertion may have more than one. In order to ensure to gain the reasonable reasoning algorithm and its feasible complexity, a special set D\-L(c) is introduced. Two properties of certainty lattice are obtained by taking advantage of the set D\-L(c). After these preparations, the constraint propagation calculus for the system is studied, and soundness and completeness of the constraint propagation calculus are proved. Compared with L-ALC, the system L-ALCN is more expressive and it can be proved that reasoning tasks of the system L-ALCN are Pspace-complete.
  • Related Articles

    [1]Guo Yuhan, Zhang Yu, Shen Xueli, Yu Junyu. Multi-Strategy Solution Space Graph Search Algorithm of Real-Time Ride-Sharing Problem[J]. Journal of Computer Research and Development, 2020, 57(6): 1269-1283. DOI: 10.7544/issn1000-1239.2020.20190484
    [2]Sun Qian, Xue Leiqi, Gao Ling, Wang Hai, Wang Yuxiang. Selection of Network Defense Strategies Based on Stochastic Game and Tabu Search[J]. Journal of Computer Research and Development, 2020, 57(4): 767-777. DOI: 10.7544/issn1000-1239.2020.20190870
    [3]Shen Yijie, Zeng Dan, Xiong Jin. A Benefit Model Based Data Reuse Mechanism for Spark SQL[J]. Journal of Computer Research and Development, 2020, 57(2): 318-332. DOI: 10.7544/issn1000-1239.2020.20190563
    [4]Wang Ye, Li Qingbao, Zeng Guangyu, Chen Zhifeng. A Code Reuse Attack Protection Technique Based on Code Anti-Leakage[J]. Journal of Computer Research and Development, 2016, 53(10): 2277-2287. DOI: 10.7544/issn1000-1239.2016.20160423
    [5]Xie Heng, Wang Mei, Le Jiajin, Sun Li. Calculation Results Characteristics Extract and Reuse Strategy Based on Hive[J]. Journal of Computer Research and Development, 2015, 52(9): 2014-2024. DOI: 10.7544/issn1000-1239.2015.20140548
    [6]Jin Wenbing, Shi Feng, Zuo Qi, Zhang Yang. Study of Ahead Branch Prediction Architecture and Algorithm[J]. Journal of Computer Research and Development, 2013, 50(10): 2228-2238.
    [7]Lin Junmin, Wang Wei, Qiao Lin, and Tang Zhizhong. A Cache Replacement Policy Based on Reuse Distance Prediction and Stream Detection[J]. Journal of Computer Research and Development, 2012, 49(5): 1049-1060.
    [8]Zhang Qi, Wang Mei, Le Jiajin, Liu Guohua. Scheduling Algorithm for the Reuse Buffers in Column-Store Data Warehouse Query Execution[J]. Journal of Computer Research and Development, 2011, 48(10): 1942-1950.
    [9]Luo Shutong, Pei Zhili, Zhang Changhai, Jin Ying. A of Feature Reuse Method at Requirement Level Based on Aspect Encapsulation[J]. Journal of Computer Research and Development, 2011, 48(9): 1714-1721.
    [10]Song Shijie, Hu Huaping, Zhou Jiawei, and Jin Shiyao. A Sequential Pattern Mining Algorithm Based on Large-Itemset Reuse[J]. Journal of Computer Research and Development, 2006, 43(1): 68-74.

Catalog

    Article views (900) PDF downloads (593) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return