Model theory of subject domains.~II
Algebra i logika, Tome 61 (2022) no. 4, pp. 500-510.

Voir la notice de l'article provenant de la source Math-Net.Ru

@article{AL_2022_61_4_a7,
     author = {D. E. Pal'chunov},
     title = {Model theory of subject {domains.~II}},
     journal = {Algebra i logika},
     pages = {500--510},
     publisher = {mathdoc},
     volume = {61},
     number = {4},
     year = {2022},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/AL_2022_61_4_a7/}
}
TY  - JOUR
AU  - D. E. Pal'chunov
TI  - Model theory of subject domains.~II
JO  - Algebra i logika
PY  - 2022
SP  - 500
EP  - 510
VL  - 61
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/AL_2022_61_4_a7/
LA  - ru
ID  - AL_2022_61_4_a7
ER  - 
%0 Journal Article
%A D. E. Pal'chunov
%T Model theory of subject domains.~II
%J Algebra i logika
%D 2022
%P 500-510
%V 61
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/AL_2022_61_4_a7/
%G ru
%F AL_2022_61_4_a7
D. E. Pal'chunov. Model theory of subject domains.~II. Algebra i logika, Tome 61 (2022) no. 4, pp. 500-510. http://geodesic.mathdoc.fr/item/AL_2022_61_4_a7/

[1] D. E. Palchunov, “Teoriya modelei predmetnykh oblastei. I”, Algebra i logika, 61:2 (2022), 239–250 | MR

[2] D. E. Palchunov, “Pryamye slagaemye bulevykh algebr s vydelennymi idealami”, Algebra i logika, 31:5 (1992), 499–537 | MR | Zbl

[3] D. E. Palchunov, A. V. Trofimov, “Lokalnye i neischezayuschie superatomnye bulevy algebry s vydelennoi plotnoi podalgebroi”, Algebra i logika, 50:6 (2011), 822–847 | MR

[4] D. E. Palchunov, A. V. Trofimov, A. I. Turko, “Avtoustoichivost bulevykh algebr s vydelennymi idealami otnositelno silnykh konstruktivizatsii”, Sib. matem. zh., 56:3 (2015), 617–628 | MR | Zbl

[5] J. Chelsom, N. Dogar, “Linking health records with knowledge sources using OWL and RDF”, Stud. Health Technol. Inform., 257 (2019), 53–58

[6] C. Naydanov, D. Palchunov, P. Sazonova, “Development of automated methods for the critical condition risk prevention, based on the analysis of the knowledge obtained from patient medical records”, Proc. Int. conf. biomed. eng. comput. technol., SIBIRCON (Novosibirsk, Russia, October 28-30, 2015), 2015, 33–38 | DOI

[7] D. E. Palchunov, D. E. Tishkovsky, S. V. Tishkovskaya, G. E. Yakhyaeva, “Combining logical and statistical rule reasoning and verification for medical applications”, Proc. Int. multi-conf. eng., comput. inform. sci., SIBIRCON (Novosibirsk, Russia, September 18-22, 2017), 2017, 309–313 | DOI

[8] A. Khamparia, B. Pandey, “Comprehensive analysis of semantic web reasoners and tools: a survey”, Educ. Inform. Technol. (Dordr.), 22:6 (2017), 3121–3145

[9] B. Ganter et al. (eds.), Formal concept analysis. Foundations and applications, Springer-Verlag, Berlin-Heidelberg, 2005 | Zbl

[10] D. E. Pal'chunov, “Lattices of relatively axiomatizable classes”, Formal concept analysis, 5th Int. conf. (ICFCA 2007) (Clermont-Ferrand, France, February 12-16, 2007), Lect. Notes Comput. Sci., LNAI, 4390, eds. S. O. Kuznetsov et al., 2007, 221–239 | DOI | Zbl

[11] D. Palchunov, G. Yakhyaeva, O. Yasinskaya, “Software system for the diagnosis of the spine diseases using case-based reasoning”, Proc. Int. conf. biomedical eng. comput. technol., SIBIRCON (Novosibirsk, Russia, 28-30 October 2015), 2015, 205–210 | DOI

[12] D. E. Pal'chunov, G. E. Yakh'yaeva, “Interval fuzzy algebraic systems”, Mathematical logic in Asia, Proc. 9th Asian logic conf.'05 (Novosibirsk, Russia, August 16-19, 2005), eds. S. S. Goncharov et al., World Scientific Publishers, Hackensack, NJ, 2006, 191–202 | DOI | MR | Zbl

[13] G. Yakhyaeva, “Logic of fuzzifications”, Proc. 4th Indian int. conf. artif. intell., IICAI 2009 (Tumkur, Karnataka, India, December 16-18, 2009), eds. B. Prasad et al., 2009, 222–239

[14] G. Yakhyaeva, “Application of boolean valued and fuzzy model theory for knowledge base development”, Proc. 2019 Int. multi-conf. eng., comput. inform. sci., SIBIRCON (Novosibirsk, Russia, 21-27 October 2019), 2019, 868–871 | DOI

[15] G. Yakhyaeva, O. Yasinskaya, “Application of case-based methodology for early diagnosis of computer attacks”, J. Comput. Inform. Technol., 22:3 (2014), 145–150 | DOI