{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:09:15Z","timestamp":1753884555133,"version":"3.41.2"},"reference-count":34,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:00:00Z","timestamp":1575936000000},"content-version":"vor","delay-in-days":343,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007819","name":"Shanxi Normal University","doi-asserted-by":"publisher","award":["872022"],"award-info":[{"award-number":["872022"]}],"id":[{"id":"10.13039\/501100007819","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>How to effectively deal with missing values in incomplete information systems (IISs) according to the research target is still a key issue for investigating IISs. If the missing values in IISs are not handled properly, they will destroy the internal connection of data and reduce the efficiency of data usage. In this paper, in order to establish effective methods for filling missing values, we propose a new information system, namely, a fuzzy set\u2010valued information system (FSvIS). By means of the similarity measures of fuzzy sets, we obtain several binary relations in FSvISs, and we investigate the relationship among them. This is a foundation for the researches on FSvISs in terms of rough set approach. Then, we provide an algorithm to fill the missing values in IISs with fuzzy set values. In fact, this algorithm can transform an IIS into an FSvIS. Furthermore, we also construct an algorithm to fill the missing values in IISs with set values (or real values). The effectiveness of these algorithms is analyzed. The results showed that the proposed algorithms achieve higher correct rate than traditional algorithms, and they have good stability. Finally, we discuss the importance of these algorithms for investigating IISs from the viewpoint of rough set theory.<\/jats:p>","DOI":"10.1155\/2019\/3213808","type":"journal-article","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T23:30:54Z","timestamp":1576020654000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fuzzy Set\u2010Valued Information Systems and the Algorithm of Filling Missing Values for Incomplete Information Systems"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1385-0947","authenticated-orcid":false,"given":"Zhaohao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaoping","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2019,12,10]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/bf01001956"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25929-9_4"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.02.032"},{"key":"e_1_2_11_4_2","first-page":"146","volume-title":"Lecture Notes in Computer Science","author":"Greco S.","year":"1999"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/11908029_27"},{"key":"e_1_2_11_6_2","doi-asserted-by":"crossref","unstructured":"JensenR.andShenQ. Interval-valued fuzzy-rough feature selection in datasets with missing values Proceedings of 2009 IEEE International Conference on Fuzzy Systems August 2009 Jeju Island South Korea 610\u2013615.","DOI":"10.1109\/FUZZY.2009.5277289"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.04.002"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2010.02.004"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1111\/0824-7935.00162"},{"key":"e_1_2_11_10_2","first-page":"41","article-title":"Rough set approach to incomplete information systems","volume":"177","author":"Kryszkiewicz M.","year":"2007","journal-title":"Information Sciences"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0020-0255(03)00061-6"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.04.023"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0020-0255(98)10019-1"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2014.05.009"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1142\/s021848850200134x"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.20051"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.11.013"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.06.027"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1198\/016214501750332839"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.03.018"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.joems.2017.07.004"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.06.003"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.07.017"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0020-0255(98)00012-7"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0019-9958(65)90241-x"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.20152"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2013.03.008"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2015.03.008"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.02.002"},{"key":"e_1_2_11_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2010.99"},{"key":"e_1_2_11_31_2","doi-asserted-by":"crossref","unstructured":"TwalaB. CartwrightM. andShepperdM. Ensemble of missing data techniques to improve software prediction accuracy Proceedings of the 28th International Conference on Software Engineering May 2006 Shanghai China 909\u2013912 https:\/\/doi.org\/10.1145\/1134285.1134449.","DOI":"10.1145\/1134285.1134449"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1002\/1098-111x(200101)16:1<87::aid-int7>3.0.co;2-s"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0020-0255(98)10065-8"},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2018.07.006"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/3213808.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/3213808.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2019\/3213808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:38:33Z","timestamp":1723030713000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2019\/3213808"}},"subtitle":[],"editor":[{"given":"Lingzhong","family":"Guo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1155\/2019\/3213808"],"URL":"https:\/\/doi.org\/10.1155\/2019\/3213808","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"2019-07-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3213808"}}