Next Article in Journal
Enhancing Accuracy of Runge–Kutta-Type Collocation Methods for Solving ODEs
Next Article in Special Issue
On Machine-Learning Morphological Image Operators
Previous Article in Journal
A Novel IGC Scheme for RHV with the Capabilities of Online Aerodynamic Coefficient Estimation and Trajectory Generation
Previous Article in Special Issue
The Singular Value Decomposition over Completed Idempotent Semifields
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Four-Fold Formal Concept Analysis Based on Complete Idempotent Semifields

Department of Signal Theory and Communications, Universidad Carlos III de Madrid, 28911 Leganés, Spain
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Submission received: 30 November 2020 / Revised: 25 December 2020 / Accepted: 12 January 2021 / Published: 15 January 2021

Abstract

:
Formal Concept Analysis (FCA) is a well-known supervised boolean data-mining technique rooted in Lattice and Order Theory, that has several extensions to, e.g., fuzzy and idempotent semirings. At the heart of FCA lies a Galois connection between two powersets. In this paper we extend the FCA formalism to include all four Galois connections between four different semivectors spaces over idempotent semifields, at the same time. The result is K ¯ -four-fold Formal Concept Analysis ( K ¯ -4FCA) where K ¯ is the idempotent semifield biasing the analysis. Since complete idempotent semifields come in dually-ordered pairs—e.g., the complete max-plus and min-plus semirings—the basic construction shows dual-order-, row–column- and Galois-connection-induced dualities that appear simultaneously a number of times to provide the full spectrum of variability. Our results lead to a fundamental theorem of K ¯ -four-fold Formal Concept Analysis that properly defines quadrilattices as 4-tuples of (order-dually) isomorphic lattices of vectors and discuss its relevance vis-à-vis previous formal conceptual analyses and some affordances of their results.

1. Introduction

This paper tries to show how Linear Algebra over idempotent semifields in general—and Galois connections in particular—contributes to the program of Lattice Computing (LC) [1] and its attempt to provide “an evolving collection of tools and methodologies that process lattice-ordered data”, as a means of establishing an information processing paradigm belonging to the wider field of Computational Intelligence [2], with an explicit aim at modelling Cyber–Physical Systems [3].
Recall that an idempotent semifield is an idempotent semiring—therefore with a natural order associated to it—with a multiplicative group structure where the unit element is not the maximum ([4], Section 2 and references therein). This is an algebra that resembles a standard field but whose additive structure is idempotent and so it has no additive inverse, and for that same reason exhibits strong order-related properties [5].
In fact, a complete idempotent semifield is already a complete lattice. A companion paper [6] and the present one are examples of how to “compute in lattices”, in the sense that they are analogs of operations and computations in standard algebras, e.g., fields, but mingle in those the requirements and the affordances of using a complete lattice as a basic algebra.
At the same time—as this paper will show—Linear Algebra constructs over fields produce analogues over idempotent semifields that give rise to (complete) lattices, so we almost always end up “computing with lattices”.
This idea is strengthened by the fact that the ternary semiring in Example 1 that subsumes the boolean semiring is embedded in every complete idempotent semifield, enabling a direct generalization of boolean constructions from Discrete Algebra—sets, graphs, formal power series, etc.
Example 1.
The smallest complete idempotent semifield is the boolean semiring 2 2 . The next smallest is 3 3 = { , e , } , , , · 1 , , e with carrying set { , e , } , order < e < and operations:
e e e e e e e e x x 1 e e
where is the zero element and e the unit. The semifield of Booleans 2 2 can be embedded in this semiring restricting the domain of the operations to { , } . It dual 3 3 1 = { , e , } , , , · 1 , , e is the semifield over the same carrying set, with the same inversion, dual order < d e < d , and operations:
e e e e e e e e
The dotted notation was introduced by Moreau [7]. In general, it can be conceived as a mnemonic to remember where the multiplication “point towards” = and = . □
Notice that the usual positive semifields—the positive reals, the tropical semifield and the max-plus algebra—are incomplete—barring the Boolean semifield 2 2 —lacking an inverse for the bottom element in the order. To complete an idempotent semifield K we endow it with this maximum or top, ⊤, and declare this the inverse of the bottom = 1 . Actually, the top completion provides not one but a pair of dually-ordered semifields ( K ¯ , K ̲ ) with the inversion in the multiplicative group acting as the duality inducing operator. This entails that expressions will have two (differently completed) multiplications, additions, etc., causing a notational problem that has not yet been agreed upon in the community (see the Appendix A in [6]). We adopt in this paper the dotted notation used in Examples 1 and 2, with the convention that any undotted notation refers to incomplete semifields.
Example 2
(The minimax algebra). One of the best known examples of dual pairs of completed semifields is ( R ¯ max , + , R ¯ min , + ) , the minimax algebra [8]. This is composed of:
  • The direct semifield R ¯ max , + , the completed max-plus algebra [9]—also morphological algebra [10], lattice algebra [11], or polar semifield—
    R ¯ max , + = R { , } , max , + , · , , 0 ,
  • Its dual semifield is R ¯ min , + , the (completed) min-plus algebra, or tropical semiring.
    R ¯ min , + = R { , } , min , + , · , , 0 ,
In minimax algebra, the notation solves problems like + = and + = . □
This, as well, has historical reasons that have led some researchers to postulate Linear Algebra over the max-plus semifield as the “algebra of combinatorics” [12].

1.1. Galois Connections between Idempotent Semimodules and Formal Concept Analysis

Idempotent semimodules—also known as idempotent spaces [13]—are the products of idempotent semifields analogously to vector spaces over the fields R and C [6] (§ 2.1). When K is an idempotent semifield, Cohen and collaborators [14] (Theorem 42, adapted) proved that a matrix R K g × m defines a Galois connection between the complete idempotent semimodules K g and K m mediated by the scalar product · R · : K g × K m K , with ( x , y ) x R y = x R y 1 , where the matrix–vector operations arise naturally from those of the semifield, ( · ) 1 is the entry-wise inversion and x = ( x 1 ) T . The dual adjuncts or polars of the connection are:
x R , φ = { y K m x R y φ } y R , φ = { x K g x R y 1 φ }
where φ is any invertible, e.g., non-null element of the semifield, and the joins are taken with respect to the natural order in the semifield. Note that this construction evidences the existence of many lattices relevant to a linear form over idempotent spaces: the ambient spaces, the images, etc.
In prior works [15,16,17], we studied the applicability of such results to provide a generalization of Formal Concept Analysis (FCA) for matrices with real entries. FCA is an attempt at re-structuring lattice theory with the explicit aim of “…promoting better communication between lattice theorists and potential users of lattice theory” [18]. Its canonical exposition is [19], but more succinctly its essence can be captured in a single, extensive theorem:
Theorem 1
(Fundamental theorem of FCA). Let G be a set of formal objects, M a set of formal attributes and ( G , M , I ) be a formal context with I 2 2 g × m . Then:
  • The context analysis phase.
    (a)
    The polar operators · : 2 2 G 2 2 M and · : 2 2 M 2 2 G .
    A = { m M g A , g I m } B = { g G m B , g I m }
    form a Galois connection ( · , · ) : 2 2 G 2 2 G whose formal concepts are the pairs ( A , B ) of closed elements such that A = B A = B whence the set of formal concepts is
    B ( G , M , I ) = { ( A , B ) 2 2 G × 2 2 M A = B A = B } .
    (b)
    Formal concepts are partially ordered with the hierarchical order
    ( A 1 , B 1 ) ( A 2 , B 2 ) A 1 A 2 B 1 B 2 .
    and the set of formal concepts with this order B ( G , M , I ) , is a complete lattice B ̲ ( G , M , I ) called the concept lattice of ( G , M , I ) .
    (c)
    In B ̲ ( G , M , I ) infima and suprema are given by:
    t T ( A t , B t ) = t T A t , t T A t t T ( A t , B t ) = t T B t , t T B t
    (d)
    The basic functions γ ¯ : G V and μ ¯ : M V
    g γ ¯ ( g ) = ( { g } , { g } ) m μ ¯ ( m ) = ( { m } , { m } )
    are mappings such that γ ¯ ( G ) is supremum-dense in B ̲ ( G , M , I ) , μ ¯ ( M ) is infimum-dense in B ̲ ( G , M , I ) .
  • The context synthesis phase.
    (a)
    A complete lattice L = L , is isomorphic to (read “can be built as”) the concept lattice B ̲ ( G , M , I ) if and only if there are mappings γ ¯ : G L and μ ¯ : M L such that
    • γ ¯ ( G ) is supremum-dense in L , μ ¯ ( M ) is infimum-dense in L , and
    • g I m is equivalent to γ ¯ ( g ) μ ¯ ( m ) for all g G and all m M .
    (b)
    In particular, consider the doubling context of L , K ( L ) = ( L , L , ) , and the standard context of L , S ( L ) = ( J ( L ) , M ( L ) , ) where J ( L ) and M ( L ) are the sets of join- and meet-irreducibles, respectively, of L , then
    B ̲ ( K ( L ) ) L B ̲ ( S ( L ) ) .
Proof. 
See [19] [Ch. 1], or the slow buildup of results in [20] [Ch. 7].  □
Note that FCA can both be understood as a data analysis technique for Boolean tables—the analysis phase—and as a synthesis technique for a Boolean matrix that “respects” the order of some lattice—the synthesis phase. Almost 40 years of develoments has uncovered a treasure trove of results that span applied mathematics [19], computer and data science [21,22] (See also the proceedings of the conference series ICFCA, International Conference on Formal Concept Analysisis, and CLA, Concept Lattices and their Applications).
For the LC programme, the crucial synthesis half of the theorem asserts that concept lattices have universal representation capabilities for complete lattices. Otherwise said, any instantiation of the LC paradigm for discrete or boolean data is subject to being operated and interpreted using the results of FCA. In particular, every encoding of information into a lattice can equivalently be represented by a formal context, and vice-versa.
Importantly, in [23] [§ 3.8] it was proven that construction (3) obtains the Galois Connection at the heart of FCA when the complete idempotent semifield is 3 3 , φ = e , and the entries in the matrix are restricted to { , } . This was built on results from [17] that defined precisely an extension to FCA using idempotent-semifield valued formal contexts, to be explained next.

1.2. K -Formal Concept Analysis as Linear Algebra over Idempotent Semifields

When K ¯ is a complete idempotent semifield, an analogue to FCA for matrices with entries in a semifield K ¯ -Formal Concept Analysis ( K ¯ -FCA) was proposed and developed in [15,16]. This line of work culminated in the realization and proof that although the motivating notions for the generalization were order-theoretic, its operation could be entirely algebraic if done with completed idempotent semifields [24,25]. These developments were extensively based in previous work in the (completed and incomplete) tropical and schedule algebras [8,9,13,14,26,27,28,29]. It was instantiated with the minimax algebra and applied to, for example, the analysis of genomic [30], and positive data [31], or even Exploratory Data Analysis [32]. Note that a similar approach to extending FCA had previously been developed for matrices with entries in a fuzzy-semiring, today grouped under the name FCA in a fuzzy setting [33,34,35], but fuzzy semirings are not idempotent semifields, except for 2 2 itself.
The next proposition, coming from [14] for finite values of the threshold parameter φ , was extended to deal with the non-finite cases in [25], and to include the notion of bikernel:
Proposition 1
(Galois connections between complete idempotent semimodules). Let K ¯ be a complete idempotent semifield and R K g × m a matrix with values in its carrier set. Consider the vector spaces X = K ¯ g and Y = K ¯ m , and an element φ K ¯ . Then the bracket x R y K ¯ OI = x R y 1 induces a Galois connection ( · R , φ , · R , φ ) : X Y between the spaces through the poles
x R , φ = R T x 1 φ 1 y R , φ = R y 1 φ 1
whose composition generate closure operators:
π R , φ ( x ) = R ( R x φ ) φ 1 π R T , φ ( y ) = R T ( R 1 y φ ) φ 1
which define two bijective sets, B G φ and B M φ over which the polars are dual order bijections and the closures are identities, respectively.
B G φ = ( Y ) R , φ = π R , φ ( X ) B M φ = ( X ) R = π R T , φ ( Y )
The following observations can readily be made:
  • This proposition only provides the Galois connection for K ¯ -FCA equivalent to the analysis part of Theorem 1. The synthesis part is only partially supported by the above-mentioned procedure of embedding FCA into K ¯ -FCA by means of restricting the entries of the matrix to only the extreme values. We would like a more general result than this.
  • In [24] it was proven that K ¯ -FCA is best-understood in terms of the linear algebra of the semivector spaces over K ¯ —or semimodules—that are the isomorphic sets of (7). The proof of the proposition uses both algebra over K ¯ and K ̲ , so it is actually a mixture of algebras that does the trick of reducing FCA to linear algebra.
  • For concrete algebras, we typically consider that the below-dotted reference is for semifields whose order aligns with the usual order in R , , if available, and this is the one we call K ¯ . Changing this semifield to its order-dual K ̲ is what we call changing the bias of the analysis, and this procedure should obtain a K ̲ -FCA.
The next subsection presents a further consideration.

1.3. The 4-Fold Connection

It is very well known that any matrix R 2 2 g × m defines actually four types of connections [36,37,38] (see Appendix A). Note that the other three connections are not considered to be standard FCA, and indeed are used for many other applications where adjunctions are the focus, such as rough set analysis [37] and knowledge graphs [39,40], or dual Galois connections, such as the analysis of independence in terms of antichains [41].
With this parallel in mind, in research that even pre-dates the inception of FCA, Cuninghame–Green investigated the four semimodules associated to a matrix with entries in the minimax algebra and found a number of results that parallel the standard ones [8]. This was used to extend FCA for matrices in a complete idempotent semifield, in these four directions under the name Extended K -Formal Concept Analysis [17,24,42]. Since the applications of the other three connections that are not strictly a Galois connection seem to be increasing in number, we believe it is time to reify their construction, and we call this result the K ¯ -four-fold Formal Concept Analysis ( K ¯ -4FCA) (Section 3 and [23]) . This work is an extension and completion of that.
Furthermore, if we consider that the matrix R takes value in the carrier set K ¯ of a complete semimodule K ¯ , since inversion is an involution over this set, we may also consider that the manipulation of the matrix is done in the dual complete semifield K ̲ , whence the same constructions that obtained K ¯ -4FCA allows us to obtain K ̲ -four-fold Formal Concept Analysis ( K ̲ -4FCA), that is to say, four more connections that are dual to the previous in a very specific meaning of the word. This paper also explores this possibility and what it entails.
Note that this paper has a sibling paper that discusses the Fundamental Theorem of Linear Algebra over idempotent semifields and its relation to an idempotent Singular Value Decomposition and matrix reconstruction [6], but in this paper we restrict ourselves to the issues that are pertinent to all flavours of K ¯ -FCA and their duals K ̲ -FCA.

1.4. Reading Guide

This paper is an updated and completed version of [23] including material from [43]. We investigate in it:
(1)
the four-fold Galois connections related to an idempotent semifield-valued matrix;
(2)
what are the implications of a change of bias, that is, using K ̲ for the analysis;
(3)
the relation to LC, in general, and to Formal Concept Analysis, in particular, and
(4)
the relationship of these techniques with other types of FCA.
For that purpose, we refer the reader to [6] (Section 2.1) for an introduction to linear algebra over idempotent semifields and their vector spaces. We take a brief look at their homomorphisms (Section 2.1) and then we present our results in Section 3. We start by presenting four-fold connections in detail (Section 3.1) going over their adjuncts as specialized types of homomorphisms (Section 3.1.2, Section 3.1.3 and Section 3.1.4), bikernels (Section 3.1.1), dualities (Section 3.1.5), leading into our presentation of K ¯ -four-fold Formal Concept Analysis in Section 3.2. This evolves from the framing of the construction (Section 3.2.1) through the definition of quadrilattices and quadriconcepts (Section 3.2.2) and a Fundamental Theorem for K ¯ -four-fold Formal Concept Analysis closely following that of FCA (Section 3.2.3). Given the relevance of duality in our framework introduced by the use pairs of dual completed idempotent semifields, we are led to discuss such issues as dualities (Section 3.2.4) reduction and reconstruction of contexts (Section 3.2.5) in an effort to understand the basics and interpretation of K ¯ -4FCA . A brief discussion (Section 4) in the context of LC closes the paper.

2. Linear Algebra over Complete Idempotent and Positive Semifields

An introduction to the linear algebra over complete idempotent semifields is already available in [6] (Section 2.1). Recall that a semimodule over a semiring K is the generalization of a module over a ring [6] (Section 2.1). In this section, we only clarify the universal algebra foundations of the subsemimodules induced by a homomorphism between complete semimodules.

2.1. Homomorphims of Complete K -semimodules

Let K be a complete idempotent semifield. A map F : X Y from a K -semimodule X to a K -semimodule Y is linear or a homomorphism of K -semimodules, F H o m ( X , Y ) , if it is additive and homogeneous
F ( x 1 x 2 ) = F ( x 1 ) F ( x 2 ) x 1 , x 2 X F ( λ x ) = λ F ( x ) λ K , x X
so that F ( ϵ X ) = ϵ Y . The following notions may be defined with a set-theoretic flavour and the details supplied with universal-algebraic consideration:
Definition 1
(bikernel of a mapping [27]). Let F : X Y be a mapping. Then:
  • The bikernel of F, K ER F is the equivalence:
    K ER F = { ( x 1 , x 2 ) X 2 F ( x 1 ) = F ( x 2 ) }
    with blocks [ x ] K ER F = F 1 ( F ( x ) ) so that K ER F = { F 1 ( F ( x ) ) x X } .
  • Its orthogonal (set) is
    K ER F = { y Y y = F ( x 1 ) = F ( x 2 ) , ( x 1 , x 2 ) K ER F } = I M F
Note that:
  • In this paper we use kernel to refer to monotone, contractive idempotent endomorphisms of ordered sets in Appendix A. This justifies the new name of “bikernel”.
  • The equivalence classes have no uniform cardinality. Some may be unitary while others have infinite elements.
  • The notion of “orthogonality” does not add anything special to the concept of “image” in this set-theoretic context, but it will for algebras.
We can relate these notions with the adequate instance of the First Isomorphism Theorem from Universal Algebra [44] (Chapter II).
Theorem 2.
Let K be a complete idempotent semifield and let F : X Y be a homomorphism of K -semimodules. Then:
  • I M F is a K -subsemimodule of Y ,
  • K ER F is a congruence on X , that is, an equivalence on X that is also a K -semimodule of X 2 , and
  • I M F is isomorphic to X / K ER F .
If { u i } i I is a basis for (free) X , there is a unique homomorphism F : X Y for a family { y j } j J of elements in a semimodule Y such that F ( u i ) = y j [45]. In such case, the homomorphism F : K g K m can be written as F ( x ) = A x , where A K m × g is a matrix. This is the basic representation of homomorphisms for the rest of this paper.

3. K ¯ -Four-Fold Formal Concept Analysis

In this section we first introduce the order theory-motivated concept of the four-fold connection, and then we cast K ¯ -four-fold Formal Concept Analysis ( K ¯ -4FCA) into it. Some results from [15,16,17,23,24,25,42] are here summarized with new results woven into the exposition along with some proofs of results that were left implicit.

3.1. The Four-Fold Galois Connection over Complete Idempotent K -Semimodules

Galois connections are generally ubiquitous in order theory and crucial in FCA (see Appendix A). In idempotent semifields, they generalize the concept of linear transformations between spaces and their inverses to a certain extent, since given a matrix R K g × m there are four possible types of Galois connections between the spaces associated to the matrix due to scalar products in the semifield K ¯ . The basic construction was introduced in Proposition 1, as a Galois connection, without a proof. We re-state it now along with the other three connections to show a number of issues that emerge time and again when dealing with Galois connections in idempotent semifields.
Theorem 3
( K ¯ -four-fold Galois connection). Let K ¯ be a complete idempotent semifield, and consider the vector spaces X = K ¯ g and Y = K ¯ m , a matrix R K ¯ g × m and a scalar φ K ¯ . Then:
1.
The bracket x R y K ¯ OI = x R y 1 induces a Galois connection ( · R , φ , · R , φ ) : X Y between the spaces through the polar maps: Equation (5), whose composition generate closure operators: Equation (6), which define two bijective sets, the system of φ-extents B X φ and the system of φ-intents B Y φ over which the polars are dual order bijections and the closures are identities, respectively: Equation (7).
2.
The bracket x R y K ¯ IO = x T R y induces a co-Galois connection ( · R 1 , φ , · R 1 , φ ) : X Y between the scaled spaces through the co-polar maps:
x R 1 , φ = R x 1 φ y R 1 , φ = R 1 y 1 φ
whose composition generate interior operators or kernels:
κ R 1 , φ ( x ) = R 1 ( R T x φ 1 ) φ κ R , φ ( y ) = R ( R y φ 1 ) φ
which define two bijective sets the system of φ-neighbourhoods of objects or φ-co-extents N X φ and φ-neighbourhoods of attributes or φ-co-intents N G M φ over which the co-polar maps are dual-order bijections and the kernels the identities, respectively.
N X φ = ( Y ) R 1 , φ = κ R 1 , φ ( X ) N M φ = ( X ) R 1 , φ = κ R , φ ( Y )
3.
The bracket x R y K ¯ OO = x R y induces a left adjunction ( ( · ) R , φ , ( · ) R , φ ) : X Y between the scaled spaces through the left adjunct pair of maps:
x R , φ = R x φ y R , φ = R y φ 1
whose compositions are the closure of extents and kernel of co-intents:
π R , φ ( x ) = ( x R , φ ) R , φ κ R , φ ( y ) = ( y R , φ ) R , φ
which define an order bijection between the system of φ-extents B X φ and φ-co-intents N Y φ over which the closure of extents and kernel of co-intents are identities.
B X φ = ( Y ) R , φ = π R , φ ( X ) N Y φ = ( X ) R , φ = κ R , φ ( Y )
4.
The bracket x R y K ¯ II = x T R y 1 induces an adjunction on the right ( ( · ) R T , φ , ( · R T , φ ) ) : X Y between the scaled spaces through the pair of adjunct maps:
x R T , φ = R T x φ 1 y R T , φ = R 1 y φ
whose compositions are the kernel of co-extents and the closure of extents:
κ R 1 , φ ( x ) = ( x R T , φ ) R T , φ π R T , φ ( y ) = ( φ R T y ) R T , φ
which define another bijection between the system of φ-co-extents N X φ and φ-intents B Y φ over which the kernel of co-extents and the closure of intents are identities,
N X φ = ( Y ) R T , φ = κ R 1 , φ ( X ) B Y φ = ( X ) R T , φ = π R T , φ ( Y )
Proof. 
Statement 1 is included in Proposition 1, so we first prove that. By definition, x R , φ = { y Y x R y K ¯ OI φ } . We solve for y in the inequality:
x R y K ¯ OI = x R y 1 φ y 1 x R φ = R x φ
whence, inverting, y R T x 1 φ 1 . By Lemma 2 in [6] (§ 2.1.5), the right-hand side term is known to be the greatest solution to the equation R 1 y = x 1 φ 1 , whence it is also the looked-for join. Row-column dually on y R , φ = { x X x R y K ¯ OI φ } , the rest of (5) follows.
Clearly, x R = R T x 1 φ 1 Y y x X R y 1 φ 1 = y R where the double implication was obtained by residuating the original inequality and inverting afterwards. This proves that the dual adjuncts form a Galois connection: by the results in Appendix A, (6) and (7) follow.
The proof of statement 2 is order-dual to that of statement 1. While those of 3 and 4, also mutually order-dual, follow by just inverting one of the orders, either that for X or that for Y .  □
Note that the manner in which this proof proceeds will apply to many other proofs: one of the basic cases is proven, then another one follows by order-duality, then the other two, also mutually order-dual, follow by inverting one of the spaces in the first two cases. We will refer to this proof schema as four-fold GC-duality.
This four-fold connection can be seen as the diagram in Figure 1.
This picture is a grand summary but provides very little detail about the structure inside the ranges of the adjoints, dual adjoints, closure and kernel functions, and the bikernels which we investigate in the following sections.

3.1.1. The Bikernels of the Four-fold Connection

In FCA, the quotient sets of the polars are important because they determine a fundamental limitation of the formal context: sets of objects (or attributes) beween which it cannot distinguish. They are used mainly for reducing the context and the concept lattice ([19], notes to Chapter 1). Note that:
  • In the semifield setting, the bikernels of K -homomorphisms are already congruences of K -semimodules. Therefore, the route provided by Definition 2 of [6] (§ 2.1.4) is clearly the way to define such congruences for adjunctions: from (13) we can see that one adjunct is a K ¯ -homomorphism while the other is a K ̲ -homomorphism. These adjuncts already appear in [46] (Remark 3) in explicit matrix form, without the scaling. The row-column dual approach leads to the right adjunction of (16). This entails that in the context of the 4-fold GC we will have, in general, both types of congruence, so from now on we distinguish them as K ¯ -congruences and K ̲ -congruences.
  • However, for other types of Galois connections, the situation is not so clear. This approach would have to be researched anew for the Galois and co-Galois connection from (5) and (10), since these are join- and meet-inverting, respectively, hence neither K ¯ - nor K ̲ -homomorphisms. In particular, although bikernels of these other types of adjuncts are equivalence relations, their relation to their ambient semimodule seems more convoluted.
In our approach, we prefer to concentrate on bikernels for closure and kernel operators and this treatment has to be extended using Definition 1 rather than that of [6] (§ 2.1.6).
Definition 2.
Let R K ¯ g × m . For the four-fold connection in Theorem 3 the bikernels induced by the closure operators are the equivalence relations:
K ER π R , φ ( · ) = { ( x 1 , x 2 ) X 2 π R , φ ( x 1 ) = π R , φ ( x 2 ) } K ER π R T , φ ( · ) = { ( y 1 , y 2 ) Y 2 π R T , φ ( y 1 ) = π R T , φ ( y 2 ) }
and those of the kernel operators are:
K ER κ R 1 , φ ( · ) = { ( x 1 , x 2 ) X 2 κ R 1 , φ ( x 1 ) = κ R 1 , φ ( x 2 ) } K ER κ R , φ ( · ) = { ( y 1 , y 2 ) Y 2 κ R , φ ( y 1 ) = κ R , φ ( y 2 ) }
Since dealing with the normalized spaces and the pivot φ is cumbersome, from now on we exclude them from the notation as mentioned beforehand.
Although the bikernels are the quotient sets of the closure and kernel operators in Theorem 3, the next lemma shows that they coincide with the bikernels induced by the adjuncts.
Lemma 1.
In the conditions of Theorem 3, the bikernels of the adjuncts coincide with those of Definition 2.
K ER π R ( · ) = K ER ( · ) R = K ER ( · ) R K ER π R T ( · ) = K ER ( · ) R = K ER ( · ) R T K ER κ R ( · ) = K ER ( · ) R 1 = K ER ( · ) R , K ER κ R 1 ( · ) = K ER ( · ) R 1 = K ER ( · ) R T .
Proof. 
For the first equation of (21) we have to prove ( x 1 , x 2 ) K ER π R ( · ) ( x 1 , x 2 ) K ER ( · ) R , with bikernels of the polars
K ER ( · ) R = { ( x 1 , x 2 ) X x 1 R = x 2 R } K ER ( · ) R = { ( y 1 , y 2 ) Y y 1 R = y 2 R } .
For ( x 1 , x 2 ) K ER π R ( · ) , call ( x 1 R ) R = ( x 2 R ) R = a . Then, applying again the polars ( ( x 1 R ) R ) R = ( ( x 2 R ) R ) R = a R = b . Considering that ( · ) R and ( ) ˙ R are mutually inverses on B X φ and B Y φ , we have x 1 R = x 2 R = b , which proves the forward inclusion. Likewise, for ( x 1 , x 2 ) K ER ( · ) R call x 1 R = x 2 R = b , whence ( x 1 R ) R = ( x 2 R ) R = b R = a , the backwards inclusion.
We next prove K ER κ R ( · ) = K ER ( · ) R 1 . If ( y 1 , y 2 ) K ER ( · ) R then ( y 1 ) R = ( y 2 ) R = a whence ( ( y 1 ) R ) R = ( ( y 2 ) R ) R = a R = d whence ( y 1 , y 2 ) K ER κ R ( · ) . On the other hand, if ( y 1 , y 2 ) K ER κ R ( · ) then ( ( y 1 ) R ) R = ( ( y 2 ) R ) R = d whence ( y 1 R ) R R = ( y 2 R ) R R = d R = a , so ( y 1 ) R = ( y 2 ) R = a —by the properties of the left adjunction and the fact that a = d R a R = d —whence ( y 1 , y 2 ) K ER ( · ) R . Four-fold GC-dually.  □
Actually this allows us to characterize the bikernels and their isomorphic images by means of the first theorem on isomorphisms on K -semimodules, Theorem 2.
Corollary 1.
In the conditions of Theorem 3,
1.
K ER π R ( · ) is a K ¯ -congruence on X isomorphic to I M ( · ) R N ¯ Y φ , a K ¯ -subsemimodule of Y .
2.
K ER κ R ( · ) is a K ̲ -congruence on Y isomorphic to I M ( · ) R B ̲ X φ , a K ̲ -subsemimodule of X .
3.
K ER π R T ( · ) is a K ¯ -congruence on Y isomorphic to I M ( · ) R T N ¯ X φ , a K ¯ -subsemimodule of X .
4.
K ER κ R 1 ( · ) is a K ̲ -congruence on X isomorphic to I M ( · ) R T B ̲ Y φ , a K ̲ -subsemimodule of Y .
Proof. 
For 1, consider the left adjunction ( ( · ) R , ( · ) R : X ¯ Y ¯ . Since ( · ) R is a K ¯ -homomorphism, by isomorphism Theorem 2, we have that K ER ( · ) R = K ER π R ( · ) is a K ¯ -congruence isomorphic to I M ( · ) R N ¯ Y φ . The second statement follows from the K ̲ -homomorphism ( · ) R . The other two statements from considering the right adjunction.  □
Note that the isomorphism is set up by means of the definitions of the congruence classes:
π R 1 ( a ) = { x X π R ( x ) = a } π R T 1 ( b ) = { y Y π R T ( y ) = b } κ R 1 ( d ) = { y Y κ R ( y ) = d } κ R 1 1 ( c ) = { x X κ R 1 ( x ) = c }
which suggests, when possible, to name the classes of equivalence after their canonical-element, that is, [ x ] K ER π R ( · ) = π R 1 ( a ) where a = π R ( x ) , and analogously for intents, co-extents and co-intents. The order structure of the set e.g., B X φ with respect to that of K ¯ is important, hence we introduce the notation, e.g. B ̲ X φ (resp. B ¯ X φ ) to indicate that the set is aligned in its joins with K ¯ (resp. K ̲ ).
Corollary 2.
In the conditions of Theorem 3,
K ER π R ( · ) = { π R 1 ( a ) a B ̲ X φ } K ER π R T ( · ) = { π R T 1 ( b ) b B ̲ Y φ } K ER κ R ( · ) = { κ R 1 ( d ) d N ¯ Y φ } K ER κ R 1 ( · ) = { κ R 1 1 ( c ) c N ¯ X φ }
Proof. 
Each class D K ER κ R ( · ) maps onto a co-intent d N ¯ Y φ . In the opposite direction, for each open element d that class is D κ R 1 ( d ) , which is not void, since d itself belongs to it. Four-fold-GC dually.  □
Note that we also have π R 1 ( a ) = ( ( · ) R ) 1 ( d ) = ( ( · ) R ) 1 ( b ) and analogously for the other closure and the interior operators, but the notation with the adjuncts is certainly more cumbersome.
The congruence classes inherit the structure of the semimodule in question:
Corollary 3.
In the conditions of Theorem 3,
1.
The congruence classes of K ER π R ( · ) are join-subsemilattices of X .
2.
The congruence classes of K ER π R T ( · ) are join-subsemilattices of Y .
3.
The congruence classes of K ER κ R 1 ( · ) are meet-subsemilattices of X .
4.
The congruence classes of K ER κ R ( · ) are meet-subsemilattices of Y .
Proof. 
We prove the statement for K ER π R ( · ) . Let x 2 , x 1 π R 1 ( a ) with a R = b b R = a . Recall that is the join in X and ( · ) R transforms joins into meets, whence: ( x 1 x 2 ) R = ( x 1 x 2 ) R = x 1 R x 2 R = b b = b , whence π R ( ( x 1 x 2 ) ) = b R = a so that x 1 x 2 π R 1 ( a ) . Four-fold-GC dually.  □
Since the closures and kernels are endofunctions, the following lemma is not surprising.
Lemma 2.
In the conditions of Theorem 3,
1.
Every class in K ER π R ( · ) intersects the system of extents B ̲ X φ at a single point.
2.
Every class in K ER π R T ( · ) intersects the system of intents B ̲ Y φ at a single point.
3.
Every class in K ER κ R 1 ( · ) intersects the system of co-extents N ¯ X φ at a single point.
4.
Every class in K ER κ R ( · ) intersects the system of co-intents N ¯ Y φ at a single point.
Proof. 
For claim 1, see [25] [propo 3.23]. We next prove claim 4, to review the procedure. Let κ R ( y ) = d , whence d [ y ] K ER κ R ( · ) . Call d R = a , where a is the extent bijectively related to co-intent d by the left adjunction. Since a R = d , this also means that d N ¯ Y φ . However, if we suppose that there is a different d [ y ] K ER κ R ( · ) N ¯ Y φ , then we will have d R = a and therefore ( d R ) R = a R = d , so d is not open whence d N ¯ Y φ , a contradiction. Four-fold GC-dually.  □
Perhaps more importantly, the intersections have canonical status.
Corollary 4.
In the conditions of Theorem 3,
1.
Every extent a B ̲ X is the maximum of its congruence class a = a ˇ = π R 1 ( a ) .
2.
Every intent b B ̲ Y is the maximum of its congruence class b = b ˇ = π R T 1 ( b ) .
3.
Every co-extent c N ¯ X is the minimum of its congruence class c = c ^ = κ R 1 1 ( c ) .
4.
Every co-intent d N ¯ Y is the minimum of its congruence class d = b ^ = κ R 1 ( b ) .
Proof. 
As proven in the previous lemma, a π R 1 ( a ) . Since a is the closure of the elements in the class, x π R 1 ( a ) , a x whence a = x ˇ = π R 1 ( a ) as defined in (30) of [6] (§ 2.1.6). Four-fold GC-dually.  □

3.1.2. Extremal Exploration in the Four-Fold Connection

The next Proposition extends a number of results from [25] [Sec. 3.7]. It deals with specific values of the φ parameter.
Proposition 2.
In the conditions of Theorem 3,
1.
If φ = , then B ̲ X N ¯ X B ̲ Y N ¯ Y 1 1 and
K ER π R , ( · ) = { X } K ER π R T , ( · ) = { Y } K ER κ R , ( · ) = { Y 1 } K ER κ R 1 , ( · ) = { X 1 }
with
x X , π R , ( x ) = g , κ R 1 , ( x ) = g y Y , π R T , ( y ) = m , κ R , ( y ) = m
2.
If φ , then:
{ g , R m } B ̲ X φ { R T g , m } B ̲ Y φ { R g , m } N ¯ Y φ { g , R 1 m } N ¯ X φ
with
x N R , π R , φ ( x ) = R m y N R 1 , π R T , φ ( y ) = R T g y N R , κ R , φ ( y ) = R g x N R T , κ R 1 , φ ( x ) = R 1 m
3.
Furthermore, if φ = , then B ̲ X B ̲ Y N ¯ X N ¯ Y 2 2 with:
K ER π R , φ ( · ) = { N R , X N R } K ER π R T , φ ( · ) = { N R 1 , Y N R 1 } K ER π R , φ ( · ) = { N R , X N R } K ER π R T , φ ( · ) = { N R 1 , Y N R 1 }
Proof. 
For case 1 first recall the polars of (5). Then, regardless of what vectors x X or y Y we introduce, Equation (25) follows by putting φ = in them. Since all of the space X maps to a single ⊥-intent x R , = m , then the bikernel has precisely the one class defined by that element, and GC-dually for ⊥-extents, which proves (24). Two obtain the statements regarding N ¯ X and N ¯ Y , K ER κ R 1 , ( · ) and K ER κ R , ( · ) we operate, four-fold dually, with the co-Galois connection of (11).
The case where φ highlights the importance of the null space, for if x X is such that R T x 1 = m , equivalently R x = m x N R , then we have that x R , φ = R T x 1 φ 1 = m , and GC-dually if y N R 1 then y R , φ = g . This proves also the fact that the nullspace N R is one of the classes of the bikernel of π R , φ ( · ) , and GC-dually for the nullspace N R 1 , that is (27). Now, consider that if x = g , then x R , φ = R T g , for φ . Furthermore, ( g R , φ ) R , φ = R ( R g ) = g , where the last step follows because the composition of the polars is a closure. Again, the rest of the statements follow four-fold dually from (11).
Finally, for case 3 note that the inner product defining intents and extents reads x R y 1 = , which is a matrix equation in K ̲ . Since this is an entire, zero-sum-free semifield, see [6] (§ 2.1.1), the only solutions are: for non-null y Y x R = R T x 1 = —which entails that x N R —and for non-null x X the solutions are R y 1 = y N R 1 . Since this is the specific sub-case of 2 where φ = , we know that precisely for x N R , x R , = m , and GC-dually for y N R 1 , y R , = g . Since m N R 1 and g N R , we conclude B ̲ Y has exactly two elements B ̲ Y = { R T g , m } and GC-dually B ̲ X = { R m , g } . The structure of the bikernels is clear: since we have two intents and because ( π R , ( · ) ) 1 ( m ) = N R , we must have ( π R , ( · ) ) 1 ( R T g ) = X N R , and GC-dually for the bikernel of Y . The rest of the statement follows by using the co-Galois connection of (11).  □
In proving Proposition 2, we obtained some easy corollaries:
Corollary 5.
In the conditions of Theorem 3,
1.
If φ = then
B ̲ X = { g } B ̲ Y = { m } N ¯ Y = { m } N ¯ X = { g }
2.
If φ = then
B ̲ X = { R m , g } B ̲ Y = { R T g , m } N ¯ Y = { R g , m } N ¯ X = { R m , g }
3.
If R = g × m is totally saturated, then B ̲ X φ = { g } , B ̲ Y φ = { m } , N ¯ X φ = { g } , N ¯ Y φ = { m } .
4.
When φ , if R K g × m has no saturated rows,
{ g , g } B ̲ X φ { g , g } N ¯ X φ
and if R∈K g×m has no saturated columns,
{ m , m } B ̲ Y φ { m , m } N ¯ Y φ
5.
When φ the nullspaces are blocks of the bikernels:
N R = π R 1 ( R m ) K ER π R ( · ) N R 1 = π R T 1 ( R T g ) K ER π R T ( · ) N R = κ R 1 1 ( R g ) K ER κ R ( · ) N R T = κ R 1 ( R 1 m ) K ER κ R 1 ( · )
Proof. 
Statements 1 and 2 were obtained in the previous demonstration. For 3, if R = g × m , then φ , x , x R , φ = R x 1 = m . Four-fold GC-dually for the rest of the sets of extents, co-extents and co-intents. Statement 4 follows from (26) and the fact that if R has no full rows, then R m = g , and four-fold GC-dually for the rest of results. Finally, statement 5 is a consequence of the previous lemmas and (27) in Proposition 2. It shows that the nullspaces are the classes related to top and bottom elements in the set of fixpoints.  □
Note that for extremal φ { , } , the description of the closure and interior systems and the bikernels is completed by Proposition 2 and Corollary 5.

3.1.3. Invertible φ -Exploration in the Four-Fold Connection

We next introduce the most typical case of the four-fold connection with invertible φ .
Theorem 4
( K ¯ -four-fold connection, invertible φ ). Let K ¯ be a complete idempotent semifield, and consider the vector spaces X = K ¯ g and Y = K ¯ m , a matrix R K ¯ g × m , an invertible element φ = γ μ K ¯ and the scaled spaces
X ˜ γ = K ¯ g γ Y ˜ μ = K ¯ m μ ( Y ˜ μ ) 1 = K ̲ m μ 1 = ( K ̲ m ) ˜ ( μ 1 ) ( X ˜ γ ) 1 = K ̲ g γ 1 = ( K ̲ g ) ˜ ( γ 1 )
Then
1.
The bracket x R y K ¯ OI = x R y 1 induces a Galois connection ( · R , · R ) : X ˜ γ Y ˜ μ between the scaled spaces through the polar maps:
x R = R T x 1 y R = R y 1
whose composition generate closure operators:
π R ( x ) = ( x R ) R = R ( R x ) π R T ( y ) = ( y R ) R = R T ( R 1 y )
which define two bijective sets, the system of φ-extents B ̲ X γ and the system of φ-intents B ̲ Y μ over which the polars are dual order bijections and the closures are identities, respectively.
B ̲ X γ = ( Y ˜ μ ) R = π R ( X ˜ γ ) B ̲ Y μ = ( X ˜ γ ) R = π R T ( Y ˜ μ )
2.
The bracket x R y K ¯ IO = x T R y induces a co-Galois connection ( · R 1 , · R 1 ) : ( X ˜ γ ) 1 ( Y ˜ μ ) 1 between the scaled spaces through the co-polar maps:
x R 1 = R x 1 y R 1 = R 1 y 1
whose composition generate interior operators or kernels:
κ R 1 ( x ) = ( x R 1 ) R 1 = R 1 ( R T x ) κ R ( y ) = ( y R 1 ) R 1 = R ( R y )
which define two bijective sets; the system of φ-neighbourhoods of objects or φ-co-extents N ¯ X γ and φ-neighbourhoods of attributes or φ-co-intents N ¯ Y μ over which the co-polar maps are dual-order bijections and the kernels the identities, respectively.
N ¯ X γ = ( ( Y ˜ μ ) 1 ) R 1 = κ R 1 ( ( X ˜ γ ) 1 ) N ¯ Y μ = ( ( X ˜ γ ) 1 ) R 1 = κ R ( ( Y ˜ μ ) 1 )
3.
The bracket x R y K ¯ o o = x R y induces a left adjunction ( · R , · R ) : X ˜ γ ( Y ˜ μ ) 1 between the scaled spaces through the left adjunct pair of maps:
x R = R x y R = R y
whose compositions are the closure of extents and kernel of co-intents:
π R ( x ) = ( x R ) R κ R ( y ) = ( y R ) R
which define an order bijection between the system of φ-extents B ̲ X γ and φ-co-intents N ¯ Y μ over which the closure of extents and kernel of co-intents are identities.
B ̲ X γ = ( ( Y ˜ μ ) 1 ) R = π R ( X ˜ γ ) N ¯ Y μ = ( X ˜ γ ) R = κ R ( ( Y ˜ μ ) 1 )
4.
The bracket x R y K ¯ II = x T R y 1 induces an adjunction on the right ( · R T , · R T ) : ( X ˜ γ ) 1 Y ˜ μ between the scaled spaces through the pair of adjunct maps:
x R T = R T x y R T = R 1 y
whose compositions are the kernel of co-extents and the closure of extents:
κ R 1 ( x ) = ( x R T ) R T π R T ( y ) = ( y R T ) R T
which define another bijection between the system of φ-co-extents N ¯ X γ and φ-intents B ̲ Y μ over which the kernel of co-extents and the closure of intents are identities,
N ¯ X γ = ( Y ˜ μ ) R T = κ R 1 ( ( X ˜ γ ) 1 ) B ̲ Y μ = ( ( X ˜ γ ) 1 ) R T = π R T ( Y ˜ μ )
Proof. 
Note that since γ and μ are invertible, then the dotting (for these scalars) can be ignored. So given a finite φ = γ μ , since γ μ = γ μ = γ μ , the inequality x R y K ¯ OI φ may be rewritten using residuation as:
x R y 1 γ μ γ ( x R y 1 ) / μ e ( γ 1 x ) R ( y 1 μ ) e ( x γ ) R ( y μ ) 1 e ( x ˜ γ ) R ( y ˜ μ ) 1 e
the products by a scalar x γ = x ˜ γ and y μ = y ˜ μ have the interpretation of (finite) scalings in the original spaces. Similarly, for the co-Galois connection-inducing bracket x R y K ¯ IO φ we rewrite
x T R y γ μ γ ( x T R y ) / μ e γ 1 x T R y μ 1 e ( x γ 1 ) T R ( y μ 1 ) e
this shows that the scaling in this case is ( Y ˜ μ ) 1 = K ̲ m μ 1 and ( X ˜ γ ) 1 = K ̲ g γ 1 . Rewriting the bracket inequalities for left and right adjunctions lead to the same scalings.
Therefore, we are in the situation of Theorem 3, over the scaled spaces X ˜ γ and Y ˜ μ with invertible φ = e . Recall that e is the unit element, whence all the results follow from there.  □
Note that the precise notation with generic φ and the scaled spaces is cumbersome. We will use it only sparingly, mainly when scaled and non-scaled magnitudes appear in the same equation.
This four-fold connection can be seen as the diagram in Figure 2.
This picture is a grand summary but provides very little detail about the structure inside the ranges of the adjoints, dual adjoints, closures and kernel functions, which we investigate next. The core of the following proposition comes from [23], but it was not proven there. In it we have emphasized the semifields generating the semimodules.
Proposition 3.
In the conditions of Theorem 4,
1.
The systems of φ-extents, -intents, -co-extents and -co-intents carry a K ¯ - or K ̲ -semimodule structure generated by the rows and columns of the matrix:
B ̲ X γ = R K ̲ B ̲ Y μ = R T K ̲ N ¯ Y μ = R K ¯ N ¯ X γ = R 1 K ¯
In particular, they are not sub-semimodules of the ambient spaces but their order duals, B ̲ X γ ( X ˜ γ ) 1 , B ̲ Y μ ( Y ˜ μ ) 1 , N ¯ Y μ Y ˜ μ , and N ¯ X γ X ˜ γ .
2.
These structures are isomorphic or dually isomorphic:
B ¯ X γ ( B ¯ Y μ ) d N ̲ Y μ ( N ̲ X γ ) d
3.
In fact, they carry a complete lattice structure with operations:
a i B ̲ X γ , i I a i = i I a i i I a i = π R ( i I a i ) b i B ̲ Y μ , i I b i = i I b i i I b i = π R T ( i I b i ) d i N ¯ Y μ , i I d i = κ R ( i I d i ) i I d i = i I d i c i N ¯ X γ , i I c i = κ R 1 ( i I c i ) i I c i = i I c i
Proof. 
For 1, the result involving the closures were proven in [25] [§ 3.2] on the standard Galois connection. For illustrative purposes we are going to prove it for the interior systems using the co-Galois connection: let κ R 1 ( x ) = ( x R 1 ) R 1 = R 1 ( R T x ) be the projector onto the set of φ -co-extents, an interior operator, and let a generic y ( Y ˜ μ ) 1 . Consider a K ¯ -combination of the columns of R 1 , R 1 y . We have: κ R 1 ( x ) = R 1 ( R T ( R 1 y ) ) = R 1 y by the properties of the matrix products, whence R 1 K ¯ N ¯ X γ . Now consider c N ¯ X γ whence R 1 ( R T c ) = c , but this precisely means that c is the combination of columns of R 1 , with coefficients b = R T c , whence N ¯ X γ R 1 K ¯ , as desired. Four-fold GC-dually for φ -extents, -intents, and -co-intents.
Note that we have also proven that there is a b ( Y ˜ μ ) 1 such that b = R T c = c R T so that c = R 1 b . Which means that actually b B ̲ Y μ are the coefficients of the combination above that generate c N ¯ X γ and vice-versa, so B ̲ Y μ = { c R T = R T c c N ¯ X γ } { b R T = R 1 b b B ̲ Y μ } = N ¯ X γ . GC-dually, with the left adjunction we can prove: B ̲ X γ = { d R = R d d N ¯ Y μ } { a R = R a a B ̲ X γ } = N ¯ Y μ . Likewise, with the Galois connection we generate B ̲ X γ ( B ̲ Y μ ) d and with the co-Galois connection, we generate N ¯ X γ ( N ¯ Y μ ) d , whence statement 2 follows 4-fold GC-dually.
For statement 3, consider B ̲ X γ . Since it is a complete K ̲ -semimodule, it is a complete meet semilattice with the meet definition given by (44). For { a i } i J B ̲ X γ we would like to define a join operation so that a = i J a i , with a B ̲ X φ . For that to be the case, since the left adjoint of (36) is a join morphism we must have: a R = ( i J a i ) R = i J ( a i ) R = i J ( a i ) R , the last step because B ¯ Y μ is a K ¯ -semimodule. Substituting the value of the adjunct and operating we get a R = i J R a i = R ( i J a i ) = ( i J a i ) R . If we close with the right adjoint we find: a = ( a R ) R = ( ( i J a i ) R ) R = π R ( i J a i ) which provides the operational form of the join. This is clearly an upper bound on the { a i } i J since we i J a i a i for i J , and we are applying to it a closure. It is the lowest upper bound since for a B ̲ X γ with i J a i a < a , by applying the closure, which is monotone, we must have π R ( i J a i ) π R ( a ) π R ( a ) but since previously demonstrated π R ( i J a i ) = π R ( a ) which entails π R ( a ) = π R ( a ) and this entails a = a in B ̲ X γ . Four-fold GC-dually for the other missing operations.  □
Note that the semimodule structures invoked by statement 1 in Proposition 3 involve a scalar multiplication that is not implied for the other operation in the lattice described in statement 3. In ([25], Section 3.1.3) a procedure similar to that used to construct the complementary latticial operation is invoked to provide the analogue of a “scalar product” in the dual semimodule structure , but we will not provide it here.

3.1.4. The Complements and the Tetrahedron Connection

It should be evident by now that the picture of the four-fold connection is completed by the existence of two more dual isomorphisms:
Lemma 3.
In the conditions of Theorem 4, there are two dual lattice isomorphisms:
· X c : B ̲ X γ N ¯ X γ · Y c : B ̲ Y μ N ¯ Y μ a a X c = ( ( a ) R ) R T = ( ( a ) R ) R 1 b b Y c = ( ( b ) R ) R = ( ( b ) R 1 ) R T
with inverses:
· c X : N ¯ X γ B ̲ X γ · c Y : N ¯ Y μ B ̲ Y μ c c c X = ( ( c ) R T ) R = ( ( c ) R 1 ) R d d c Y = ( ( d ) R 1 ) R T = ( ( d ) R ) R
so that a X c = c c c X = a and b Y c = d d c Y = d . On the lattices, these complements are just the inversion a = c 1 and b = d 1 .
Proof. 
By composition of the polars in any two chains of generalized Galois connections in the four-fold connection: this involves one monotone and one antitone connections, whence the composition is antitone. Since they are compositions of isomorphisms when restricted to the images of the polars, they are also (antitone) isomorphisms.
Let x X , with π R ( x ) = a B ̲ X γ , d = ( x ) R = ( a ) R and c = ( d ) R 1 . Then x X c = ( ( x ) R ) R 1 = ( d ) R 1 = c . Using the expressions of the polars, we have x X c = ( ( x ) R ) R 1 = R 1 ( R T x 1 ) = R ( R x ) 1 = π R ( x ) 1 = a 1 . So, in particular when x = a , we have a X c = a 1 = c .
Similarly, for x X , with κ R 1 ( x ) = c N ¯ X γ , with d = ( x ) R 1 , and a = ( d ) R we have: x c X = ( ( x ) R 1 ) R = ( d ) R = a . On the other hand, ( ( x ) R 1 ) R = R ( R x 1 ) = R 1 ( R T x ) 1 = κ R 1 ( x ) 1 = c 1 , so, in particular when x = c , we have c c X = c 1 = a . The reasoning is row-column dual for the dual order isomorphism between B ̲ Y μ and N ¯ Y μ .  □
Recall that ( · ) 1 : X X , x x 1 is a (dual order) isomorphism. We just proved it is also a (perfect) Galois connection between B ̲ X γ and N ¯ X γ just as Figure 3 shows.
Note that this means that we do not have to use the new notation for this “dual isomorphism” and we can use the inversion with this new understanding.
Furthermore, we have to complement our old version of the four-fold connection with the two new inversions, to create a sort of tetrahedral figure as in Figure 4.

3.1.5. Dual Exploration

It may seem strange that we started with K ¯ but the scalar products leading to the definition of the different Galois connections operated in K ̲ . This is actually a requisite of the original work discovering the connections [14], but it also dovetails into previous, unrelated work [41,47].
We can do the opposite operation: start using K ̲ what leads onto operations in K ¯ . Since the choice of semifield in which to interpret R represents a (choice of) modelling bias [23], using these results is what we call bias-duality. This accounts for a K ̲ -dual of Theorem 4 and Proposition 3:
Theorem 5
(The K ̲ -four-fold connection, invertible φ ). Let K ̲ be a complete idempotent semifield, and consider the vector spaces X = K ̲ g and Y = K ̲ m , a matrix R K ̲ g × m , an invertible element φ = γ μ K ̲ and the scaled spaces
X ˜ γ = K ̲ g γ Y ˜ μ = K ̲ m μ ( Y ˜ μ ) 1 = K ¯ m μ 1 = ( K ¯ m ) ˜ ( μ 1 ) ( X ˜ γ ) 1 = K ¯ g γ 1 = ( K ¯ g ) ˜ ( γ 1 )
Then
1.
The bracket x R y K ̲ OI = x R y 1 induces a Galois connection ( · R , · R ) : X ˜ γ Y ˜ μ between the scaled spaces through the polars
x R = R T x 1 y R = R y 1
whose composition generates closure operators:
π R d ( x ) = ( x R ) R = R ( R x ) π R T d ( y ) = ( y R ) R = R T ( R 1 y )
which define two bijective sets, the system of φ-extents B ¯ X γ and the system of φ-intents B ¯ Y μ over which the closures are the identities.
B ¯ X γ = ( Y ˜ μ ) R = π R d ( X ˜ γ ) B ¯ Y μ = ( X ˜ γ ) R = π R T d ( Y ˜ μ )
2.
The bracket x R y K ̲ IO = x T R y induces a co-Galois connection ( · R 1 , · R 1 ) : ( X ˜ γ ) 1 ( Y ˜ μ ) 1 between the scaled spaces through the maps:
x R 1 = R x 1 y R 1 = R 1 y 1
whose composition generate kernel (interior) operators:
κ R 1 d ( x ) = ( x R 1 ) R 1 = R 1 ( R T x ) κ R d ( y ) = ( y R 1 ) R 1 = R ( R y )
which define two bijective sets the systems of φ-neighbourhoods of objects or φ-co-extents N ̲ X γ and φ-neighbourhoods of attributes or φ-co-intents N ̲ Y μ over which the kernel operators are the identities.
N ̲ X γ = ( ( Y ˜ μ ) 1 ) R 1 = κ R 1 d ( ( X ˜ γ ) 1 ) N ̲ Y μ = ( ( X ˜ γ ) 1 ) R 1 = κ R d ( ( Y ˜ μ ) 1 )
3.
The bracket x R y K ̲ OO = x R y induces a left adjunction ( · R , · R ) : X ˜ γ ( Y ˜ μ ) 1 between the scaled spaces through the left adjunct pair of maps:
x R = R x y R = R y
whose compositions, are again, the closure of extents and interior of attributes:
π R d ( x ) = ( x R ) R κ R d ( y ) = ( y R ) R
which define another bijection between the systems of extents B ¯ X γ and neighbourhoods of attributes N ̲ Y μ :
B ¯ X γ = ( ( Y ˜ μ ) 1 ) R N ̲ Y μ = ( X ˜ γ ) R
4.
The bracket x R y K ̲ II = x T R y 1 induces an adjunction on the right ( · R T , · R T ) : ( X ˜ γ ) 1 Y ˜ μ between the scaled spaces through the pair of adjunct maps:
x R T = R T x y R T = R 1 y
whose compositions are, again, the interior of objects and the closure of attributes:
κ R 1 d ( x ) = ( x R T ) R T π R T d ( y ) = ( y R T ) R T
which define another bijection between the neighbourhood of objects N ̲ X γ and system of intents B ¯ Y μ :
N ̲ X γ = ( Y ˜ μ ) R T B ¯ Y μ = ( ( X ˜ γ ) 1 ) R T
5.
The systems of φ-extents, -intents, -co-extents and -co-intents carry a K ¯ - or K ̲ -semimodule structure generated by the rows and columns of the matrix:
B ¯ X γ = R K ¯ B ¯ Y μ = R T K ¯ N ̲ Y μ = R K ̲ N ̲ X γ = R 1 K ̲
In particular, they are not sub-semimodules of the ambient spaces but their order duals, B ¯ X γ ( X ˜ γ ) 1 , B ¯ Y μ ( Y ˜ μ ) 1 , N ̲ Y μ Y ˜ μ , and N ̲ X γ X ˜ γ .
6.
These structures are isomorphic or dually isomorphic:
B ¯ X γ ( B ¯ Y μ ) d N ̲ Y μ ( N ̲ X γ ) d
7.
In fact, they carry a complete lattice structure with operations:
a i B ¯ X γ , i I a i = i I a i i I a i = π R d ( i I a i ) b i B ¯ Y μ , i I b i = i I b i i I b i = π R T d ( i I b i ) d i N ̲ Y μ , i I d i = κ R d ( i I d i ) i I d i = i I d i c i N ̲ X γ , i I c i = κ R 1 d ( i I c i ) i I c i = i I c i
Proof. 
Conventional approach: consider the bracket x R y K ̲ OI = x R / y T = x R y 1 using residuation in K ̲ . Based on merely formal similarities to item 1 of Theorem 4, this is going to generate a Galois connection—in the order of K ̲ which is dual to that of K ¯ . By following the proof in [24] we arrive at the new polars and thence, to the closures. Four-fold GC-dually.
Short approach: use bias-duality on the results of Theorem 4 and Proposition 3.  □
These results are summarized, again in a schematic diagram in Figure 5.
Note that ([8], p. 70) already displays a less detailed version of Figure 2 and Figure 5 side-by-side. Although the order-theoretic implications were not evident there, the following was:
Proposition 4.
Let K be the carrier set of both K ¯ and K ̲ and consider the matrix R K g × m , and an invertible element φ = γ μ K . In general K ¯ - and K ̲ - K ¯ -four-fold Formal Concept Analysis produce non-isomorphic lattices.
Proof. 
Note that the fixpoint operators with K ̲ bias in (49), (52), (55) or (58) are none of those with K ¯ bias in (6), (11), (14) or (17). Table 1 shows how these two sets of operators relate (e.g., in bias duality).
By a well-known result in order theory, different closure (kernel) operators generate different closure (interior) systems.  □

3.1.6. Generators and Bases

To find minimal representations for the lattices involved in Theorems 4 and 5 we introduce:
Lemma 4
(Block forms involving sets of independent vectors, K ̲ bias). Let K be the support set of a complete idempotent semifield K ̲ , a matrix R K ̲ g × m . Then,
1.
R can be reordered and factorized as
R = R I J R I J ¯ R I ¯ J R I ¯ J ¯
where I and J are the sets of indices of K ̲ -independent rows and columns | I | = l and | J | = k , respectively.
2.
Alternatively, R can be factorized as
R = V ̲ V ̲ W ̲ R = U ̲ Z ̲ U
where V ̲ and U ̲ are the sets of K ̲ -independent columns and rows of R, respectively, and W ̲ and Z ̲ are the coefficient matrices used to obtain the dependent columns and rows from them.
3.
Furthermore, R can be factorized as
R = E l Z ̲ R I J E k W ̲ with V ̲ = E l Z ̲ R I J and U ̲ = R I J E k W ̲
where W ̲ = R I J R I J ¯ and Z ̲ = R I ¯ J R I J .
Proof. 
For the first statement, we use the K ̲ version of the A -test [6] (§ 2.1.3, Proposition 2) to detect a set of dependent columns with indices J ¯ so that the independent indices are J = M J ¯ , and likewise for the indices of the dependent rows I ¯ and the independent ones I = G I ¯ . From now on consider their cardinalities fixed as 0 < | J | = k m and 0 < | I | = l g . Using these indices, we build a permutation matrix for rows P and another for columns Q as customary. By applying these to R we obtain the required block structure on our target matrix R = P T R Q . Note that R I J K l × k is the submatrix selected by the indices of K ̲ -independent rows and columns.
To make (63) and (64) compatible, call V ̲ = R I J T R I ¯ J T T . Since V ̲ are an independent set, they K ̲ -generate the other columns, say as V ̲ W = R I J ¯ T R I ¯ J ¯ T T whence R = V ̲ V ̲ W . Similarly, by transposing R and following the previous procedure we have U ̲ T = R I J T R I J ¯ T T we arrive at R T = U ̲ T U ̲ T Z ̲ T T whence transposing obtains the second part of (64).
For the third statement, from the first part of (64) we have U ̲ = R I J R I J W ̲ that we may factorize as U ̲ = R I J E k W ̲ . Dually, we can state V ̲ T = R I J T W ̲ T R I J T T = E l W ̲ T R I J T . By applying the second part of (64) we find that R = R I J R I J W ̲ Z ̲ R I J Z ̲ R I J W ̲ and factorizing left and right obtains the result. To find W ̲ we equate the last form and (63) so we get R I J W ̲ = R I J ¯ . Since R I J is just a matrix, the previous equation means that in the GC of R I J , the intents W 1 get transformed as ( W ̲ 1 ) R I J = R I J ( W ̲ 1 ) 1 = R I J ¯ which are extents. Thefore these extents re-define W ̲ as: ( R I J ¯ ) R I J = R I J T R I J ¯ 1 = W ̲ 1 whence W ̲ = R I J R I J ¯ . Row–column and GC-dually, we find Z ̲ = R I ¯ J R I J .  □
Note the following:
  • The material in statement 2 was introduced in ([6], Definition 9). The novelty in the lemma is essentially parts 1 and 3.
  • Note that the notation highlights the fact that we are using K ̲ bias. The dual-bias proposition (implicit in the text) should change the notation accordingly to V ¯ , U ¯ , etc.
A reordering of rows (or columns) does not change the subspace being generated by the matrix. We introduce a slight complexification of the notation for the lattices to make evident which matrix they relate to:
Lemma 5.
In the conditions of Theorem 3 and the notation in Lemma 4:
B ̲ X γ ( R ) = B ̲ X γ ( V ̲ ) B ̲ Y μ ( R ) = B ̲ Y μ ( U ̲ ) N ¯ Y μ ( R ) = N ¯ Y μ ( U ̲ ) N ¯ X γ ( R ) = N ¯ X γ ( V ̲ )
and in the conditions of Theorem 5 and the bias-dual of Lemma 4:
B ¯ X γ ( R ) = B ¯ X γ ( V ¯ ) B ¯ Y μ ( R ) = B ¯ Y μ ( U ¯ ) N ̲ Y μ ( R ) = N ̲ Y μ ( U ¯ ) N ̲ X γ ( R ) = N ̲ X γ ( V ¯ )
Proof. 
Recall that for a generic matrix R K ¯ g × m we defined B ̲ X γ ( R ) = { a K ¯ g π R ( a ) = a } with π R ( x ) = R ( R x ) . To prove B ̲ X γ ( R ) = B ̲ X γ ( V ̲ ) , let a B ̲ X γ ( R ) = R K ̲ , so that a = R d . Recall from (64) that R = V ̲ V ̲ W ̲ d , therefore
π V ̲ ( a ) = V ̲ ( V ̲ a ) = V ̲ ( V ̲ ( R d ) ) = V ̲ ( V ̲ ( V ̲ V ̲ W ̲ d ) ) = V ̲ ( V ̲ ( V ̲ d ) ) V ̲ ( V ̲ ( V ̲ W ̲ d ) )
and by the properties of matrix products we finally have:
π V ̲ ( a ) = V ̲ d   V ̲ W ̲ d = V ̲   V ̲ W ̲ d = R d = a
whence B ̲ X γ ( R ) B ̲ X γ ( V ̲ ) . Now let a B ̲ X γ ( V ̲ ) = V ̲ K ̲ , so that a = V ̲ d , whence
π R ( a ) = R ( R a ) = V ̲ V ̲ W ̲ ( V ̲ V ̲ W ̲ ( V ̲ d ) ) = V ̲ ( V ̲ ( V ̲ d ) ) ( V ̲ W ̲ ) ( ( V ̲ W ̲ ) ( V ̲ d ) )
Note that the second terms is the closure π V ̲ W ̲ ( V ̲ d ) and that the first term can be reduced by the matrix products so
π R ( a ) = ( V ̲ d ) π V ̲ W ̲ ( V ̲ d ) = V ̲ d = a
where the last but one equality comes from the closure property π V ̲ W ̲ ( V ̲ d ) V ̲ d and the fact that selects the minimum. Therefore B ̲ X γ ( V ̲ ) B ̲ X γ ( R ) . Four-GC dually, and bias dually.  □
Some comments are in order:
  • When referring to the lattices of different matrices, as is the case with R and V ̲ , we cannot escape their appearing in the notation, as in B ̲ X γ ( R ) , since they are, in general, different lattices. The pertinence of the decomposition of R into its independent rows is precisely that the lattices remain the same.
  • In a = R d = d R the name is fixed since we know that a = d R d = a R N ¯ Y μ ( R ) . Indeed, the 4-fold GC dual proves involve using b = a R = B ̲ Y μ ( R ) and c = b R T N ¯ X γ ( R ) . However note that in a = V ̲ d in case k m we have d K ¯ k and therefore d N ¯ Y μ ( R ) K ¯ m (see below).
  • We crucially triggered the simplification process for idempotent matrix products by introducing a = R d . We also used the fact that products of matrices generate closure (or kernel) operators that allow us to discard the closed (or open) element being operated upon based on the properties of the addition (or ). These two patterns reappear time an again in demonstrations with the blocked forms.
With the preceding Lemma we have proven also the following corollaries.
Corollary 6.
In the conditions of Theorem 3 and the notation in Lemma 4:
B ̲ X γ ( R ) = V ̲ K ̲ B ̲ Y μ ( R ) = U ̲ T K ̲ N ¯ Y μ ( R ) = U ̲ K ¯ N ¯ X γ ( R ) = V ̲ 1 K ¯
and in the conditions of Theorem 5 and the bias-dual of Lemma 4
B ¯ X γ ( R ) = V ¯ K ¯ B ¯ Y μ ( R ) = U ¯ T K ¯ N ̲ Y μ ( R ) = U ¯ K ̲ N ̲ X γ ( R ) = V ¯ 1 K ̲
Proof. 
From the previous lemma we have B ̲ X γ ( R ) = B ̲ X γ ( V ̲ ) . From (42) we have B ̲ X γ ( V ̲ ) = V ̲ K ̲ . GC-dually for B ̲ Y μ ( R ) . On the other hand, recall that B ̲ X γ ( R ) = ( N ¯ X γ ( R ) ) 1 = V ̲ K ̲ , whence N ¯ X γ ( R ) = ( V ̲ K ̲ ) 1 = V ̲ 1 K ¯ , and co-GC-dually for N ¯ Y μ ( R ) . Bias-dually for (69).  □
Recall also that by [13] (Theorem 3.3.9) V ̲ is a basis of this space, we have R K ̲ = V ̲ K ̲ , another way to reach this result.
A simultaneous projection in both rows and columns, however, actually provides generators only for isomorphic spaces. We first prove a technical Lemma.
Lemma 6.
In the conditions of Theorem 3 , let R be factorized as in Lemma 4. Then the closure and interior operators of R I J can be expressed in terms of the sets of independent rows and columns of R, V ̲ and U ̲ as:
x K ̲ k , π U ̲ ( x ) = π R I J ( x ) y K ̲ l , π V ̲ T ( y ) = π R I J T ( y ) y ( K ̲ l ) 1 , κ V ̲ ( y ) = κ R I J ( y ) x ( K ̲ k ) 1 , κ U ̲ 1 ( x ) = κ R I J 1 ( x )
Proof. 
For y K ¯ l , recall that π V ̲ T ( y ) = V ̲ T ( V ̲ 1 y ) with V ̲ T = R I J T R I J T Z ̲ T so that:
π V ̲ T ( y ) = R I J T R I J T Z ̲ R I J 1 ( Z ̲ R I J 1 ) y = R I J T R I J T Z ̲ R I J 1 y ( Z ̲ R I J 1 ) y = = R I J T ( R I J 1 y ) ( Z ̲ T R I J ) T ( ( Z ̲ T R I J ) 1 y ) = R I J T ( R I J 1 y ) = π R I J T ( y )
where the last but one step follows because ( Z ̲ T R I J ) T ( ( Z ̲ T R I J ) 1 y ) = R I J T Z ̲ ( Z ̲ R I J 1 y ) R I J T ( R I J 1 y ) since Z ̲ ( Z ̲ x ) x is a closure. The result follows because the upper addition selects the lowest term. For the other closure and interior operators we use U ̲ = R I J R I J W ̲ , U ̲ 1 and V ̲ and find the results 4-fold GC-dually.  □
The previous lemma does not provide information unless both k < m and l < g .
Proposition 5.
In the conditions of Theorem 3, let R be factorized as in (65). Then, if l < g and k < m ,
B ¯ X γ ( R ) B ¯ X γ ( R I J ) B ¯ Y μ ( R ) B ¯ Y μ ( R I J ) N ¯ Y μ ( R ) N ¯ Y μ ( R I J ) N ¯ X γ ( R ) N ¯ X γ ( R I J )
Proof. 
For the record, by Proposition 3 we have:
B ̲ X γ ( R ) ( B ̲ Y μ ( R ) ) d N ¯ Y μ ( R ) ( N ¯ X γ ( R ) ) d B ̲ X γ ( V ̲ ) ( B ̲ Y μ ( V ̲ ) ) d N ¯ Y μ ( V ̲ ) ( N ¯ X γ ( V ̲ ) ) d B ̲ X γ ( U ̲ ) ( B ̲ Y μ ( U ̲ ) ) d N ¯ Y μ ( U ̲ ) ( N ¯ X γ ( U ̲ ) ) d B ̲ X γ ( R I J ) ( B ̲ Y μ ( R I J ) ) d N ¯ Y μ ( R I J ) ( N ¯ X γ ( R I J ) ) d .
First we prove that if k < m calling X ˜ γ K ¯ l then B ¯ X γ ( R ) B ¯ X γ ( R I J ) and N ¯ X γ ( R ) N ¯ X γ ( R I J ) . Note that K ¯ m Y ˜ μ ¬ Y ˜ μ K ¯ k and we work with V ̲ . Then, by Lemma 5, B ̲ X γ ( R ) B ̲ X γ ( V ̲ ) , and by Lemma 6 we have π V ̲ T ( y ) = π R I J T ( y ) that is, B ̲ Y μ ( V ̲ ) B ̲ Y μ ( R I J ) . Therefore by composition B ̲ X γ ( R ) B ̲ X γ ( V ̲ ) ( B ̲ Y μ ( V ̲ ) ) d ( B ̲ Y μ ( R I J ) ) d B ̲ X γ ( R I J ) where we have called X ˜ γ K ¯ l , although in general we only know l g . Of course, if l = g we have X ˜ γ X ˜ γ and B ̲ X γ ( R ) B ̲ X γ ( V ̲ ) B ¯ X γ ( R I J ) . Similarly, from N ¯ X γ ( R ) N ¯ X γ ( V ̲ ) and κ V ̲ ( y ) = κ R I J ( y ) we prove N ¯ X γ ( R ) N ¯ X γ ( V ̲ ) N ¯ X γ ( R I J ) .
When l < g with Y ˜ μ K ¯ k we proceed row–column dually, using U ¯ as the pivot and the third line of (72) to prove that B ¯ Y μ ( R ) B ¯ Y μ ( R I J ) , and N ¯ Y μ ( R ) N ¯ Y μ ( R I J ) .
If we demand that both l < g and k < m we obtain the desired results.  □
Note that the bias duals of Lemma 6 and Proposition 5 demand that we use the K ¯ -version of the test to detect K ¯ -independent rows and columns I and J .
So when either l < g or k < m we can effectively reduce the computation of the original lattices of R to those of R I J , the reason why this procedure is called a reduction ([19], chap. 1).
Proposition 3 along with Lemma 6 and Proposition 5 suggest that we reify the results of (43) and (61) (see also [23]).
Definition 3
(The quadrilattice). Choose bias K ¯ and an invertible φ K ¯ . For a matrix R K ¯ g × m , its quadrilattice Q ¯ φ ( R ) K ¯ is the set of four-tuples ( a , b , c , d ) with a B ̲ X γ ( R ) , b B ̲ Y μ ( R ) , c N ¯ X γ ( R ) , and d N ¯ Y μ ( R ) issued from Proposition 3 where a R = b b R = a b R T = c a R = d . Its bias-dual from Theorem 5 is Q ¯ φ ( R ) K ̲ .
Note that these are isomorphic or dually isomorphic lattices B ̲ X γ ( R ) ( B ̲ Y μ ( R ) ) d N ¯ Y μ ( R ) ( N ¯ X γ ( R ) ) d , and further B ̲ X γ ( R ) = ( N ¯ X γ ( R ) ) 1 and B ̲ Y μ ( R ) = ( N ¯ Y μ ( R ) ) 1 .
The following Proposition gives the promised form to the isomorphisms in Proposition 5.
Proposition 6.
In the conditions of Theorem 3 and the notation in Lemma 4, let R be factorized as in (63) and consider the quadrilattices Q ¯ φ ( R ) K ¯ and Q ¯ φ ( R I J ) K ¯ . Then, the following mappings,
ϕ : Q ¯ φ ( R ) K ¯ Q ¯ φ ( R I J ) K ¯ ( a , b , c , d ) ( a , b , c , d ) = ( E l E a , E k E b , E l E c , E k E d )
and:
ϕ 1 : Q ¯ φ ( R I J ) K ¯ Q ¯ φ ( R ) K ¯ ( a , b , c , d ) E l Z ̲ a , E k W ̲ T b , E l Z ̲ 1 c , E k W ̲ d
are quadrilattice isomorphisms.
Proof. 
Note that the transformations for c and d have been chosen to ensure a = c 1 and b = d 1 what means we need only concern ourselves with the first two pairs of mappings.
The trivial case is if k = g or l = m , when we simply have the identities. However, for k < g we have X ˜ γ K ¯ g K ¯ k X ˜ γ , and, similarly, for l < m we have Y ˜ μ K ¯ g K ¯ k Y ˜ μ , and this extends to their inverses, hence the ambient spaces of the lattices above are different.
First we prove that each pair of component mappings is actually a bijection. Let a B ̲ X γ ( R ) then a = V ̲ d , and the mappings acting on B ̲ X γ ( R ) and B ̲ X γ ( R I J ) are:
ϕ a ( a ) = E l E V ̲ d = E l E R I J Z ̲ R I J d = R I J d = d R I J = a
whereas in the inverse direction for B ̲ X γ ( R I J ) , with a = R I J d :
ϕ a 1 ( a ) = E l Z ̲ R I J d = R I J Z ̲ R I J d = V ̲ d = a
Four-fold GC-dually for the other pairs of mappings. Note that by combining both derivations we see that the same d appear in the definition of a and a .
To see that the overall mappings respect the tuples in the quadrilattice, first consider ( a , b , c , d ) Q ¯ φ ( R I J ) K ¯ . We have to prove a R = b : by definition a = ϕ a ( a ) , and we know that b = ( a ) R I J = R I J T ( a ) 1 , so
b = E k W ̲ T b = E k W ̲ T R I J T ( a ) 1 = U ̲ T ( a ) 1 b R = R b 1 = U ̲ Z ̲ U ̲ ( U ̲ a ) = E l Z ̲ U ̲ ( U ̲ a )
but since π U ̲ ( a ) = π R I J ( a ) = a , we have b R = E l Z ̲ a = a . With a similar chain of equalities we can prove a R = b . Note that the proof that ( a , b , c , d ) = ϕ ( a , b , c , d ) Q ¯ φ ( R I J ) K ¯ would use the same chains of proofs as the derivation above, but positing b R I J = a a R I J = b and trying to find whether b R = a a R = b .
It is easy to see that the components are isomorphisms of complete lattices. For this proof let i I by any set of indices. Then,
ϕ a ( i I a i ) = E l E ( i a i ) = T T E l E a i = i ϕ a ( a i )
where we have used that B ̲ X γ ( R ) and B ̲ X γ ( R I J ) are K ̲ -semimodules whereby the meet is the semimodule addition. Four-fold GC dually for the meets in the other coordinate lattices.
To prove ϕ a ( i I a i ) = i I ϕ a ( a i ) , equivalently i I a i = ϕ a 1 ( i I ϕ a ( a i ) ) , recall that for { a i } i I B ̲ X γ ( R ) , the complete join is i I a i = π R ( i I a i ) . We write:
i I a i = π R ( i I a i ) = π V ̲ ( i I a i ) = V ̲ ( V ̲ ( i I a i ) )
Call d i = V ̲ a i so a i = V ̲ d i and d = i I d i . Since κ R ( d i ) = V ̲ ( V ̲ d i ) = d i for all i i ,
i I a i = V ̲ ( V ̲ ( i I V ̲ d i ) ) = V ̲ ( i I V ̲ ( V ̲ d i ) ) = V ̲ ( i I d i ) = V ̲ d = a
On the other hand, call ϕ a ( a i ) = a i , so
i I ϕ a ( a i ) = π R I J ( i I a i ) = π U ̲ ( i I a i ) = U ̲ ( U ̲ ( i I a i ) )
but since U ̲ = R I J R I J W ̲ = R I J E k W ̲ and d i = R I J a i , we write
i I ϕ a ( a i ) = U ̲ ( E k W ̲ ( i I R I J a i ) ) = U ̲ ( E k W ̲ ( i I d i ) ) = U ̲ ( E k W ̲ d ) = U ̲ d
with ϕ d ( d ) = E k E ( i I d i ) = i I E k E d i = i I d i = d , whence
ϕ a 1 ( i I ϕ a ( a i ) ) = E l Z ̲ ( R I J R I J W ̲ d ) = R d = a

3.2. The Basics of K ¯ -Four-Fold Formal Concept Analysis

In this section we transform the results on the 4-fold Galois connection in Section 3.1 as a basis for a K ¯ -based four-fold FCA ( K ¯ -4FCA).

3.2.1. Framing the Analysis

First note that in order to use the results of Theorems 4 and 5—including those of Proposition 3—we have to provide the following items of information, a process we call framing (the analysis):
1.
Biasing. Choosing a non-empty support K and the actual complete idempotent semifield whether K ¯ or K ̲ .
2.
Contextualization. Providing R K g × m and G M , the sets of objects and attributes, respectively, with | G | = g and | M | = m to build the formal context ( G , M , R ) K ¯ , since we use K ¯ -bias.
3.
Scaling. Providing invertible φ = γ μ used to scale the left and right semimodules.
Note that:
  • An alternate way to carry out framing that does not alter its result is to first contextualize the analysis and then provide the bias.
  • Yet some other work casts the systematic variation of φ as an exploration of the hidden regularities of the formal context [30,32,48].
  • The corner cases for scaling φ { , } have limited interest, due to Proposition 2.
  • In previous work, we have defined a fourth step of framing: Colouring [23] the choice of which type of connection to do an analysis with. K ¯ -4FCA makes this redundant.

3.2.2. 4-Fold Formal ( φ -)Concepts

Contextualization allows us to use traditional FCA notation and write the name of the lattices in Proposition 3 by referring to the object G and attribute sets M as:
B ̲ G γ ( G , M , R ) K ¯ = B ̲ X γ ( G , M , R ) K ¯ B ̲ M μ ( G , M , R ) K ¯ = B ̲ Y μ ( G , M , R ) K ¯ N ¯ M μ ( G , M , R ) K ¯ = N ¯ Y μ ( G , M , R ) K ¯ N ¯ G γ ( G , M , R ) K ¯ = N ¯ X γ ( G , M , R ) K ¯
Therefore, with the backing of (43) (and (61)) it makes sense to define the following [23]:
Definition 4.
Let ( G , M , R ) K ¯ be a biased context and φ = γ μ invertible values. Then a generalized 4-fold formal φ-concept or quadriconcept is a 4-tuple ( a , b , c , d ) a B ̲ G γ ( G , M , R ) K ¯ , b B ̲ M μ ( G , M , R ) K ¯ , c N ¯ G γ ( G , M , R ) K ¯ , d N ¯ M μ ( G , M , R ) K ¯ , such that the following relations hold:
a = ( b ) R = ( d ) R b = ( a ) R = ( c ) R T d = ( c ) R 1 = ( a ) R c = ( d ) R 1 = ( b ) R T
The set of such quadriconcepts is Q φ ( G , M , R ) K ¯ . Notice that as a corollary of Lemma 3 and Definition 3 for ( a , b , c , d ) a generalized concept
a = c 1 c = a 1 b = d 1 d = b 1
and also that quadriconcepts are partially ordered with the hierarchical order
( a 1 , b 1 , c 1 , d 1 ) ( a 2 , b 2 , c 2 , d 2 ) a 1 a 2 b 1 b 2 c 1 c 2 d 1 d 2 .
Due to the linear algebraic properties of the adjuncts and Definition 4, we may easily build multiple four-fold concepts at the same time.
Corollary 7
(The concept-forming functions). In the conditions of Definition 4, given a matrix X K g × k whose columns are K -valued sets of objects we can build all of their four-fold concepts γ ¯ 4 X = ( A , B , C , D ) , where every co-indexed 4-tuple of columns is a four-fold concept, as
B = X R A = B R C = A 1 D = B 1
Dually for matrices Y K m × k with K -valued sets of attributes for columns with μ ¯ 4 Y = ( A , B , C , D ) as
A = Y R B = A R C = A 1 D = B 1
Proof. 
Just gather all those results as γ ¯ 4 X = ( A , B , C , D ) coindexing extents, intents, co-extents and co-intents on the same generalized concept. Row–column dually for μ ¯ 4 Y .  □
It is always interesting to know the top and bottom elements of the isomorphic lattices.
Corollary 8
(4-fold top and bottom). In the conditions of Definition 4,
4 = γ ¯ 4 g = ( g , R T g , g , R g ) 4 = μ ¯ 4 m = ( R m , m , R 1 m , m )
Note how the order of extents and intents are dual. These concepts have important special cases:
Lemma 7.
In the conditions of Definition 4,
1.
4 = ( g , m , g , m ) if and only if R has no full columns.
2.
4 = ( g , m , g , m ) if and only if R has no full rows.
Proof. 
Note that R m = g R 1 m = g , so we only have to consider either extents or co-extents. Suppose R m = g . Then, if R i · = 1 × m , then R i · m = , whence R m g , a contradiction. For the other direction, suppose for a row i there is a non-saturated column k , then R i · m = ( j k R i j ) = . The result follows if this holds for every row. The other results follows column-row dually.  □
For concept lattices it is always important to obtain the object- and attribute-concepts, since they have special properties.
Lemma 8.
In the conditions of Definition 4, the object-concepts γ ¯ 4 E g and attribute-concepts μ ¯ 4 E m are:
γ ¯ 4 E g = ( R R , R T , R 1 R T , R ) μ ¯ 4 E m = ( R , R T R 1 , R 1 , R R )
These are join-dense and meet dense on the quadrilattice, respectively.
Proof. 
Since the columns of X E g are the singleton sets of objects, we have:
B = R T ( E g ) 1 = R T A = R R C = R 1 R T D = R ( R R ) = R
Similarly, the columns of Y E m are the singleton sets of attributes, whence:
A = R ( E m ) 1 = R B = R T R 1 C = R 1 ( R T R 1 ) = R 1 D = R R
Note that the intents of γ ¯ 4 E g are meet-dense on B ̲ M φ , hence join-dense in ( B ̲ M φ ) d , and so γ ¯ 4 E g are join-dense in Q ¯ φ ( G , M , R ) K ¯ . Dually for μ ¯ 4 E m , the meet-dense.  □
These four special elements are captured in Table 2, on the left, and also drawn in Figure 2 and Figure 5.

3.2.3. A Theorem of K ¯ -Four-Fold Formal Concept Analysis

Theorem 6
(Basic theorem of K ¯ -4FCA). Let G be a set of formal objects, M a set of formal attributes, ( G , M , R ) K ¯ a K ¯ -biased context, and invertible values φ = γ μ . Then:
  • The context analysis phase. Consider the scaled spaces of (29).
    (a)
    The polar and co-polar operators, left and right adjuncts of (30), (33), (36), and (39) form a quadruple Galois connection as in Figure 2 and Figure 4 whose generalized or 4-fold formal φ-concepts are the quadriconcepts ( a , b , c , d ) of Definition 4 whence the set of generalized formal concepts is Q φ ( G , M , R ) K ¯ .
    (b)
    The set of quadriconcepts with the hierarchical order of Definition 4 is a complete lattice called the quadrilattice Q ¯ φ ( G , M , R ) K ¯ = Q φ ( G , M , R ) K ¯ , with infima and suprema given componentwise from (44) as:
    t T ( a t , b t , c t , d d ) = t T a t , t T b t , t T c t , t T d t t T ( a t , b t , c t , d d ) = t T a t , t T b t , t T c t , t T d t ,
    (c)
    The concept-forming functions γ ¯ 4 : G Q ¯ φ ( G , M , R ) K ¯ and μ ¯ 4 : M Q ¯ φ ( G , M , R ) K ¯
    g γ ¯ 4 g = γ ¯ 4 ( E G ) g m μ ¯ 4 m = μ ¯ 4 ( E M ) m
    —where e g = ( E G ) g and e m = ( E M ) m select the vectors representing the singletons { g } and { m } , respectively, and E G and E M are the matrices of unitary vectors for objects and attributes, respectively—are mappings such that γ ¯ 4 G is supremum-dense in Q ¯ φ ( G , M , R ) K ¯ , and μ ¯ 4 M is infimum-dense in Q ¯ φ ( G , M , R ) K ¯ .
  • The context synthesis phase.
    (a)
    A complete lattice L = L , is isomorphic to (read “can be built as”) the quadrilattice Q ¯ φ ( G , M , R ) K ¯ if and only if there are mappings γ ¯ : G L and μ ¯ : M L such that
    • γ ¯ ( G ) is supremum-dense in L , μ ¯ ( M ) is infimum-dense in L , and
    • R ( g , m ) φ is equivalent to γ ¯ ( g ) μ ¯ ( m ) for all g G and all m M .
    (b)
    In particular, consider the doubling context of L , K ( L ) = ( L , L , R φ ) , and the standard context of L , S ( L ) = ( J ( L ) , M ( L ) , R φ ) where J ( L ) and M ( L ) are the sets of join- and meet-irreducibles, respectively, of L , and
    R φ = φ if γ ¯ ( g ) μ ¯ ( m ) otherwise
    then
    Q ¯ φ ( L , L , R φ ) K ¯ L Q ¯ φ ( J ( L ) , M ( L ) , R φ ) K ¯ .
Proof. 
For the analysis part, statement (1.a) comes from Theorem 4, Proposition 3.2 and the definition of quadrilattice. For statement (1.b) note that the quadruple order of (80) is just the gathering of all the orderings of the connections. The component-wise infima and maxima come from Proposition 3.3. Finally, (1.c) are just object and attribute interfaces to the concept-forming functions of Corollary 7 based on the unitary vectors which obtain the join- and meet-irreducibles by Lemma 8, that is,
γ ¯ 4 G = γ ¯ 4 E G μ ¯ 4 M = μ ¯ 4 E M .
For the synthesis part, we apply Theorem 1 twice: first on the lattice L to create and isomorphic copy of it as a concept lattice, B ( G , M , I ) 1 , then once again on a quadrilattice and B ( G , M , I ) 2 and we require that both concept lattices are the same. Here are the details.
For the first application, we have that L B ( G , M , I ) 1 iff there are mappings γ ¯ : G L and μ ¯ : M L so that γ ¯ G and μ ¯ M are join- and meet dense in L ; g I 1 m γ ¯ g μ ¯ m for all g G , m M ; and ([20], Ch. 3), provides an explicit form for the isomorphic pair of functions:
ϕ 1 : B G L ψ 1 : L B G A ϕ 1 ( A ) = g A γ ¯ g x ψ 1 ( x ) = { g G γ ¯ g x } = Δ A x
Note that the isomorphism is only actually with the lattice of extents instead of the whole concept lattice. Taking this hint for the second application we concentrate on the lattice of extents instead of the whole quadrilattice. We have that B ( G , M , I ) 2 B G φ ( G , M , R ) K ¯ when there are mappings γ ¯ 4 : G B G φ ( G , M , R ) K ¯ and μ ¯ 4 : M B G φ ( G , M , R ) K ¯ so that γ ¯ 4 G and μ ¯ 4 M are join- and meet dense in Q ¯ φ ( G , M , R ) K ¯ , respectively, and on the other hand, g I 2 m γ ¯ 4 g μ ¯ 4 m for all g G , m M . We develop the last part of the equation:
γ ¯ 4 g μ ¯ 4 m γ ¯ 4 e g μ ¯ 4 e m ( Definition ) π R ( e g ) e m R ( Focus on extents ) R ( R e g ) R ( e m ) 1 ( Definition of adjuncts ) ( e g ) R ( e m ) T ( Compatibility of products , conjugation ) ( e g ) R ( e m ) 1 e ( Vector residuation )
If we restitute the expressions for the scalings in the ambient spaces:
γ 1 ( e g ) R ( e m ) 1 μ 1 e ( e g ) R ( e m ) 1 γ μ = φ
whence
g I 2 m R ( g , m ) φ
We can also provide an explicit form for the isomorphism, again onto the lattice of extents on both accounts using π R ( g ) = π R ( e g ) :
ϕ 4 : B G B G φ ( G , M , R ) K ¯ ψ 4 : B G φ ( G , M , R ) K ¯ B G A ϕ 4 ( A ) = g A π R ( g ) a ψ 4 ( a ) = A a = { g G π R ( g ) a }
To complete the proof, we just match these two isomorphisms: First, recall that the concept forming functions of part (1.c) obtain the join- and meet-dense as in (81). Notice how the G and M for B ( G , M , I ) 2 are those of ( G , M , R ) K ¯ . When we equate it to B ( G , M , I ) 1 the same G and M are those to be injected into L as dense elements. Second, if we equate both concept lattices, we also equate their induced contexts whence γ ¯ g μ ¯ m g I m R ( g , m ) φ .
Third, since the composition of isomorphisms (of orders) is also an isomorphism (of orders), we get the full expression of the overarching isomorphism:
ϕ : B G φ ( G , M , R ) K ¯ L ψ : L B G φ ( G , M , R ) K ¯ a ϕ ( a ) = ϕ 1 ( ψ 4 ( a ) ) = g A a γ ¯ g x ψ ( x ) = ϕ 4 ( ψ 1 ( x ) ) = ϕ 4 ( A x ) = g A x π R ( e g )
Then the statements in (2.b) follow by either considering G L and M L and the relation defined by (84) for the “double context” ( L , L , R φ ) K ¯ or analogously concentrating on the join- and meet reducibles G = J ( L ) and M = M ( L ) for the “small context” ( J ( L ) , M ( L ) , R φ ) K ¯ . Of course, instead of just inserting the lattice of extents, we synthesize the whole quadrilattice from it, e.g. by using the context building function on the φ extents Q ¯ φ ( G , M , R ) K ¯ = γ ¯ 4 B ̲ G φ ( G , M , R ) K ¯ .  □
Example 3
(FCA as K ¯ -4FCA). The column spaces of all Galois connections between idempotent spaces are complete lattices, and the synthesis part of the Fundamental Theorem 1 ensures that these can be expressed as the concept lattice of a particular context. This is what the proof of Theorem 6 is based upon.
However, “Standard” FCA can be implemented by 3 3 -4FCA using the default scaling φ = γ = μ = e (actually, any value other than ⊥), synthesizing L B ( G , M , I ) as Q ( G , M , I ) Q ¯ φ ( G , M , R I e ) K ¯ and colouring on the first two components (cfr. [25] which uses only K ¯ -FCA [ 3 3 ] for a similar purpose).
Since these steps use only elements from 3 3 , an isomorphic copy of which is embedded in every complete (idempotent) semifield, essentially choosing any of the latter allows for an implementation of FCA, e.g., computing in the lattice R ¯ max , + . To maintain the order embedding with the boolean semiring— 3 3 B with 0 < 1 —those completed semifields where < should be chosen as bias.

3.2.4. On the Relation between K ¯ -4FCA and K ̲ -4FCA

The order-dual of Theorem 6 is readily seen by dualizing all of the constructions and objects used in it, so we will not write it here. The relationship between their results, however, is not merely about “turning orders upside-down”—that would be the case if only and were involved in expressions—but reflects a more profound duality of which we present some examples below.
Example 4
(Utilities and costs as biases). The bias plays an important role in applications: For instance, applications that maximize utility functions are naturally thought of with bias in R ¯ max , + , while applications that minimize cost functions are naturally thought of with bias in R ¯ min , + = ( R ¯ max , + ) 1 . The theory sketched above tell us exactly how to pass from thinking in terms of (additively accumulating, idempotent) utilities to thinking in terms of (additively accumulating, idempotent) costs. The complete semifield notation, further, allows us to mix them properly.
Example 5
(Resistances and conductances). The same kind of duality is found when adding resistances (series addition) and conductances (parallel addition of resistances) in circuit analysis. The upper and lower operators simply model different operations on the same underlying phenomenon (resistivity) that has two manifestations (resistance/conductance). Note that this duality is manifested in all completed positive semifields, not just in idempotent ones [49].
A quick investigation shows that we may relate the change of bias to the original bias in K ¯ .
Lemma 9.
Let ( G , M , R ) be a formal context, φ = γ μ invertible scalars and K ̲ the bias. Then
B ¯ G γ ( G , M , R ) K ̲ = N ¯ G γ ( G , M , R 1 ) K ¯ B ¯ M μ ( G , M , R ) K ̲ = N ¯ M μ ( G , M , R 1 ) K ¯ N ̲ M μ ( G , M , R ) K ̲ = B ̲ M μ ( G , M , R 1 ) K ¯ N ̲ G γ ( G , M , R ) K ̲ = B ̲ G γ ( G , M , R 1 ) K ¯
Proof. 
The lattice-defining closures of ( G , M , R ) K ̲ are those of the right column of Table 1. If we substitute R for R 1 we realise that these are the interior operators of ( G , M , R 1 ) K ¯ . Furthermore, we then realize that the polars in (48) are those in (13) for the inverted incidence R 1 . By the unicity of closure and interior operators and their lattices the result follows for B ¯ G γ ( G , M , R ) K ̲ = N ¯ G γ ( G , M , R 1 ) K ¯ and B ¯ M μ ( G , M , R ) K ̲ = N ¯ M μ ( G , M , R 1 ) K ¯ . By using the bracket x R y K ̲ i o = x 1 R / y = x T R y that generates the co-Galois connection with bias in K ̲ we obtain the second set of results.  □
Proposition 7.
Let ( G , M , R ) be a formal context, φ = γ μ invertible scalars and K ̲ the bias. Then
Q ̲ φ ( G , M , R ) K ̲ = ( Q ¯ φ ( G , M , R 1 ) K ¯ ) 1
Proof. 
Note that Q ̲ φ ( G , M , R ) K ̲ has four “component” lattices
Q ̲ φ ( G , M , R ) K ̲ = ( B ̲ G γ ( G , M , R ) K ̲ , B ̲ M μ ( G , M , R ) K ̲ , N ¯ G γ ( G , M , R ) K ̲ , N ¯ M μ ( G , M , R ) K ̲ )
By using the result in (90) we may write
Q ̲ φ ( G , M , R ) K ̲ = ( N ̲ G γ ( G , M , R 1 ) K ¯ , N ̲ M μ ( G , M , R 1 ) K ¯ B ¯ G γ ( G , M , R 1 ) K ¯ , B ¯ M μ ( G , M , R 1 ) K ¯ )
Recalling that ( c , d , a , b ) = ( a 1 , b 1 , c 1 , d 1 ) , we apply the inversion operator to the quadrilattice as a subspace.
( Q ̲ φ ( G , M , R ) K ̲ ) 1 = ( N ̲ G γ ( G , M , R 1 ) K ¯ , N ̲ M μ ( G , M , R 1 ) K ¯ B ¯ G γ ( G , M , R 1 ) K ¯ , B ¯ M μ ( G , M , R 1 ) K ¯ ) 1 = ( N ̲ G γ ( G , M , R 1 ) K ¯ 1 , N ̲ M μ ( G , M , R 1 ) K ¯ 1 , B ¯ G γ ( G , M , R 1 ) K ¯ 1 , B ¯ M μ ( G , M , R 1 ) K ¯ 1 ) = ( B ¯ G γ ( G , M , R 1 ) K ¯ , B ¯ M μ ( G , M , R 1 ) K ¯ , N ̲ G γ ( G , M , R 1 ) K ¯ , N ̲ M μ ( G , M , R 1 ) K ¯ ) = Q ¯ φ ( G , M , R 1 ) K ¯
Since the inversion is an involution, the result follows.  □
Note that, we have suggested in passing the following results, important for transposition and conjugation contexts:
Corollary 9.
If ( a , b , c , d ) is a φ-quadriconcept of Q ¯ φ ( G , M , R ) K ¯ , then ( d , c , b , a ) is a φ-quadriconcept of Q ̲ φ ( M , G , R ) K ̲ , and vice-versa.

3.2.5. Applications: Context Reduction and Reconstruction

We have prepared two operations on contexts and their quadrilattices: reduction and reconstruction. Reduction is just a corollary of previous results.
Corollary 10
(context reduction in K ¯ -4FCA). In the conditions of Definition 4 for context ( G , M , R ) K ¯ , if I is the index of independent rows and J that of independent columns of R, and R I J the submatrix of R selected by such indices, then Q ¯ φ ( G , M , R ) K ¯ Q ¯ φ ( I , J , R I J ) K ¯ .
Proof. 
This is a corollary of Propositions 5 and 6 in the new setting of Definition 4.  □
It has already been proven that formal concepts allow us to approximate their incidence ([6], Section 3). The following result is a generalization of this.
Lemma 10.
Let R K g × m be a matrix over a completed idempotent semifield K . Then:
1.
Every generalized φ-quadriconcept ( a ¯ , b ¯ , c ¯ , d ¯ ) of the generalized concept lattice Q ¯ φ ( G , M , R ) K ¯ generates a lower bound in the reconstruction of the matrix,
R a ¯ b ¯ T = a ¯ d ¯ = c ¯ 1 b ¯ T = c ¯ 1 d ¯
2.
Every generalized φ-quadriconcept ( a ̲ , b ̲ , c ̲ , d ̲ ) of the generalized concept lattice Q ̲ φ ( G , M , R ) K ̲ generates and upper bound in the reconstruction of the matrix,
R a ̲ b ̲ T = a ̲ d ̲ = c ̲ 1 b ̲ T = c ̲ 1 d ̲
Proof. 
We prove this for the left adjunction. Since a ¯ R = d ¯ and d ¯ R = a ¯ we have that a ¯ R d ¯ e , whence:
R a ¯ e / d ¯ R a ¯ d ¯
If we try to tighten the bound as in: R a ¯ b ¯ T a ¯ d ¯ c ¯ 1 b ¯ T c ¯ 1 d ¯ we may compact this as R ( a ¯ c ¯ 1 ) ( b ¯ T d ¯ ) but we know from (79) that c ¯ = a ¯ 1 and d ¯ = b ¯ 1 whence R ( a a ) ( d d ) = a d , the last step, by the idempotency of the addition. Bias-dually we obtain the upper bound.  □
The rest of a theory of context reconstruction for quadrilattices can be easily developed from the results in [6] for a single Galois connection.

4. Discussion

4.1. FCA, K -Formal Concept Analysis and K ¯ -4FCA

In essence, the formal analysis of a context ( G , M , R ) K ¯ is based in a Galois connection induced by linear operations in the dual semifield K ̲ and a transformed matrix. Thus while FCA is eminently about computing with lattices, K -FCA is computing with lattices in lattices.
While K -FCA (so, indeed, FCA) favours the use of antitone pairs of mutual quasi inverses—that is, Galois connections—Linear Algebra favours pairs of monotonic quasi-inverses—that is, left or right adjunctions (Appendix A).
Reasons of symmetry and generalization suggest that any attempt to define K -FCA in terms of an adjunction would also make the absence of the Galois connections evident and that is the reason why [23] first suggested that the proper study of K -FCA should not be a single GC or adjunction, but the four connections at once. This paper is a better justification and an exploration of that idea and why it is an alternative to just considering simple linear functions, i.e., adjunctions, as the basic construction in Linear Algebra over complete idempotent semifields.

4.2. The Case for K ¯ -Four-Fold Formal Concept Analysis

Perhaps the most important result that we are providing is Theorem 6. By comparing the results of Section 3.1 and Section 3.2 we may ask ourselves whether K ¯ -four-fold Formal Concept Analysis warrants the reification carried in it.
Of course, one strong reason for it is the synthesis part of Theorem 6: the notions of independently motivated sets of objects G and attributes M that generate supersets of the join- and meet-irreducibles by means of the quadriconcept-forming functions suggest that the conceptualization step of Section 3.2.1 is important for the universal-representation capabilities of quadrilattices (and concept lattices in general).
This issue is related to Wille’s initial goal to make Lattice Theory more “actionable” [18]. Concepts like the “index sets” used in the reduction process in Section 3.1 would do for purely algebraic constructs. However, the cognitive implications imposed on concept lattices by the annotation of object- and attribute-concepts with their respective object and attribute names provide a lot of the affordances of concept lattices—and by extension quadrilattices—for data visualization and manipulation [31,32].
Another reason is the existence of the inverses of extents and intents described by the tetrahedral connection depicted in Figure 4. The relation between extents and co-extents, intents and co-intents is as intimate—in the existence of the perfect Galois connections represented by the inversions—as that of extents and intents—in the existence of the Galois connection of (5). Truly, extent and intents refer to two modes of existence as related by the matrix, but our point here is that extents and co-extents are two “polarities” of that existence. Since the choice of bias— K ¯ or K ̲ —highlights each of those polarities by the results in Section 3.2.4 its seems important to have the four-types of objects available both for mathematical manipulation and for cognitive focusing.
Yet, this very straightforward relationship between extents and co-extents, intents and co-intents, instantiating a very straightforward inversion relationship—or negation from the point of view of logics—may induce the belief that two of these domains is “more” basic, vital or irreducible than the others. If so, which? If from the point of view of K ¯ -four-fold Formal Concept Analysis we take these to be extents and intents, the results in Section 3.2.4 suggest that from the point of view of K ̲ -four-fold Formal Concept Analysis , co-extents and -intents would reasonably be the important ones for the same—dualized—reasons, and vice-versa. Section 3.2.4, perhaps it is wise to carry all of them so as to maintain all of their affordances at hand. With the reification we put forward the idea that it is the quadrilattice the gestalt that captures the better notion of “concept”.
Furthermore, it is well-known that a (concept) lattice does not have, in general, a complement for each of its elements whereas the existence of complements is necessary for many applications. To wit, measure theory demands that complementary—not just incompatible—events be available for every event. Quadrilattices show that such elements may be available even if none of the lattices in the tetrahedron is boolean—hence, a fortiori, a sigma-algebra. Ways to profit by the wealth of complements available in the quadrilattices construct should be explored in the future.
The result in Section 3.2.5 on reconstructing the relationship by means of upper and lower bounds built with the K ¯ - or K ̲ -quadriconcepts may seem to suggest that only two of the isomorphic lattices are important, since one two coordinates of the quadriconcepts are needed for it. Then again, precisely knowing which parts are being considered is mandatory for a successful reconstruction, what sustains the notion that the quadriconcepts are gestalten whose parts refer to each other in precisely the manner prescribed by the four-fold connection.
Although the concept of quadrilattices is developed around invertible scaling, easier to manipulate algebraically, it is also evident in the results of Section 3.1.2 that it is possible to define a quadrilattice for φ { , } , although not very representative of what the content of relation R is: most K ¯ -4FCA using the extremal values on any relation would return the same 1 1 or 2 2 lattices.
As in many previous mathematical explorations, perhaps we should wait until the applications catch up with the theory for a final ruling in this matter. The paradigm of computing in (and with) lattices is a promising ground for such endeavours.

Author Contributions

conceptualization, F.J.V.-A. and C.P.-M.; formal analysis, F.J.V.-A. and C.P.-M.; funding acquisition, C.P.-M.; investigation, F.J.V.-A. and C.P.-M.; methodology, F.J.V.-A. and C.P.-M.; writing—original draft, F.J.V.-A.; writing—review and editing, F.J.V.-A. and C.P.-M. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Spanish Government-MinECo project TEC2017-84395-P and the Dept. of Research and Innovation of Madrid Regional Authority project EMPATIA-CM (Y2018/TCS-5046).

Acknowledgments

This paper evolved from conference papers presented by the authors at ICFCA 2017 and FUZZ-IEEE 2018. We would like to acknowledge the reviewers of previous versions of this paper for their timely criticism and suggestions.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
FCAFormal Concept Analysis
K ¯ -FCA K ¯ semifield-valued Formal Concept Analysis
K ¯ -4FCAfour-fold K ¯ -FCA

Appendix A. Residuated Maps, Adjunctions and Galois Connections

This section follows [20]. Let P = P , P and Q = Q , Q be partially ordered sets. We have:
  • A map f : P Q is residuated if inverse images of principal (order) ideals of Q under f are again principal ideals. Its residual map or simply residual, f # : Q P is: f # ( q ) = max { p P f ( p ) Q q } .
  • A map g : Q P is dually residuated if the inverse images of principal dual (order) ideals under g are again dual ideals. Its dual residual map or simply dual residual, g : P Q is: g ( p ) = min { q Q p P g ( q ) } .
This duality of concepts is fortunately simplified by a well-known theorem stating that residual maps are dually residuated, while dual residual maps are residuated, hence we may maintain only the two notions of residuated maps and their residuals.
In fact, the two notions are so entwined that we give a name to them: an adjoint pair of maps ( λ , ρ ) is a pair ( λ : P Q , ρ : Q P ) between two ordered sets such that p P , q Q , p P ρ ( q ) λ ( p ) Q q , equivalently, p P ρ ( λ ( p ) ) and λ ( ρ ( q ) ) Q q .
If the order relation is actually partial the lower or left adjoint, λ is uniquely determined by its right or upper adjoint, ρ , and conversely. The characterization theorem for adjoint maps states that ( λ , ρ ) are adjoint if and only if, λ is residuated with residual ρ , or equivalently, ρ is dually residuated with λ its dual residual.
Now consider the orders P = P , P and Q = Q , Q and their order duals P d = P , P and Q d = Q , Q , to obtain two adjoint and two dually adjoint pairs:
Definition A1.
(Four different types of Galois connections and adjunctions)
1.
( λ , ρ ) is an adjunction on the left or simply a left adjunction, and we write ( λ , ρ ) : P Q iif: p P , q Q λ ( p ) Q q p P ρ ( q ) , that is, the functions are covariant, and we say that λ is the lower or left adjoint while ρ is the upper or right adjoint .
2.
( ρ , λ ) : P Q is an adjunction on the right or simply a right adjunction iff: p P , q Q ρ ( p ) Q q p P λ ( q ) , both functions are covariant, ρ is the upper adjoint, and λ the lower adjoint.
3.
( φ , ψ ) is a Galois Connection (proper), of two dual adjoints ( φ , ψ ) : P Q iff: p P , q Q φ ( p ) Q q p P ψ ( q ) , that is, both functions are contravariant. For that reason they are sometimes named contravariant or symmetric adjunctions on the right.
4.
( , ) is a co-Galois connection, of dual adjoints ( , ) : P Q if: p P , q Q ( p ) Q q p P ( q ) , that is, both functions are contravariant. For that reason they are sometimes named contravariant or symmetric adjunctions on the left. ( , ) is also a co-Galois connection.
Furthermore, as a sort of graphical summary, we introduce the diagram to the upper left-hand corner of Figure A1 as the pattern that carries the structures described in [17].
We illustrate how to read it with the diagram at the top left, which has:
  • A closure system, ρ ( Q ) = P ¯ , the closure range of the right adjoint (see below).
  • An interior system, λ ( P ) = Q ̲ , the kernel range of the left adjoint (see below).
  • A closure function [37] [suggest “closure operator”] γ P = ρ λ P I P , from P to the closure range P ¯ = ρ ( Q ) , with adjoint inclusion map P , where I P denotes the identity over P.
  • A kernel function [37] [also “interior operator”, “kernel operator”] κ P = λ ρ Q I Q , from Q to the range of Q ̲ = λ ( P ) , with adjoint inclusion map Q , where I Q denotes the identity over Q.
  • a perfect adjunction ( λ ˜ , ρ ˜ ) : P ¯ Q ̲ , that is, a dual order isomorphism between the closure and kernel ranges P ¯ and Q ̲ .
Figure A1. Diagrams visually depicting the maps and structures involved in the adjunction on the left ( λ , ρ ) : P Q (top left), Galois connection ( φ , ψ ) : P Q (top right), the co-Galois connection ( , ) : P Q (bottom left) and the adjunction on the right ( ρ , λ ) : P Q (bottom right) between two partially ordered sets (adapted from [17]). Closure operators are denoted by γ P , γ Q , interior (kernel) operators by κ P , κ Q , closure systems by P ¯ , Q ¯ and interior (kernel) systems by P ̲ , Q ̲ . (a) A left adjunction, (b) A Galois connection, (c) A co-Galois connection, (d) A right adjunction.
Figure A1. Diagrams visually depicting the maps and structures involved in the adjunction on the left ( λ , ρ ) : P Q (top left), Galois connection ( φ , ψ ) : P Q (top right), the co-Galois connection ( , ) : P Q (bottom left) and the adjunction on the right ( ρ , λ ) : P Q (bottom right) between two partially ordered sets (adapted from [17]). Closure operators are denoted by γ P , γ Q , interior (kernel) operators by κ P , κ Q , closure systems by P ¯ , Q ¯ and interior (kernel) systems by P ̲ , Q ̲ . (a) A left adjunction, (b) A Galois connection, (c) A co-Galois connection, (d) A right adjunction.
Mathematics 09 00173 g0a1
Compare the mathematical objects above with those in a Galois connection proper seen in the top right of Figure A1: the ranges are both closure systems and both compositions closure operators due to the dualisation of the second set (we write γ Q for the new closure operator), resulting in the well-known perfect Galois connection, ( φ ˜ , ψ ˜ ) : P ¯ Q ¯ , the pair of dual order-isomorphic closure ranges lying at the heart of Formal Concept Analysis. The diagrams in the bottom left and right of Figure A1 show analogue structures for co-Galois connections and right adjunctions respectively.
The different monotonicity conditions account for different properties of the adjoint maps [20]:
  • if ( λ , ρ ) form a left adjunction, then λ is residuated, preserves existing least upper bounds (for lattices, joins) and ρ preserves existing greatest lower bounds (for lattices, meets).
  • if ( φ , ψ ) form a Galois connection, then both φ and ψ invert existing least upper bounds (for lattices, they transform joins into meets).
  • if ( ρ , λ ) form a right Galois connection, then ρ preserves existing greatest lower bounds (meets for lattices) and λ is residuated, preserves existing least upper bounds (joins for lattices).
  • if ( , ) form a co-Galois connection, then both an invert existing greatest lower bounds (for lattices, they transform meets into joins).
Table A1 summarises the main properties of all types of Galois connections.
Table A1. Summary of Galois connections and their properties, for P , Q posets.
Table A1. Summary of Galois connections and their properties, for P , Q posets.
Left Adjunction (type oo): ( λ , ρ ) : P Q Galois Connection (type oi): ( φ , ψ ) : P Q
p P , q Q λ ( p ) Q q p P ρ ( q ) p P , q Q φ ( p ) Q q p P ψ ( q )
I P ρ λ and I Q λ ρ I P ψ φ and I Q φ ψ
λ = λ ρ λ and ρ = ρ λ ρ φ = φ ψ φ and ψ = ψ φ ψ
λ monotone, residuated φ antitone
ρ monotone, residual ψ antitone
λ join-preserving, ρ meet-preserving φ join-inverting, ψ join-inverting
co-Galois connection (type io): ( , ) : P Q Right Adjunction (type ii): ( ρ , λ ) : P Q
p P , q Q ( p ) Q q p P ( q ) p P , q Q ρ ( p ) Q q p P λ ( q )
I P and I Q I P λ ρ and I Q ρ λ
= and = ρ = ρ λ ρ and λ = λ ρ λ
antitone ρ monotone, residual
antitone λ monotone, residuated
meet-inverting, meet-inverting ρ meet-preserving, λ join-preserving
See [38] for a revision of the genesis and importance of Galois Connections and adjunctions, as well as a discussion of the different notation and nomenclatures for these concepts. An early tutorial with mathematical applications in mind is [36].

A Naming Convention for Galois Connections

The following naming convention was put forward in [17]. It stresses the composition with order- and dual order-isomorphisms and relates to the original names as annotated in Figure A1.
  • We take the type oo Galois connection to be a basic adjunction composed with an even number of anti-isomorphism on the domain and range orders.
  • To obtain a type oi Galois connection compose a basic adjunction with an odd number of anti-isomorphism on the range.
  • To get a a type io Galois connection we compose a basic adjunction with an odd number of anti-isomorphisms on the domain.
  • Finally, a type ii Galois connection, is a basic adjunction with an odd number of anti-isomorphisms composed on both the domain and range.

References

  1. Kaburlasos, V.G. The Lattice Computing (LC) Paradigm. In Proceedings of the 15th International Conference on Concept Lattices and their Applications CLA, Tallinn, Estonia, 29 June–1 July 2020; Valverde-Albacete, F.J., Trnecka, M., Eds.; Tallinn University of Technology: Tallinn, Estonia, 2020; pp. 1–7. [Google Scholar]
  2. Kaburlasos, V.G.; Ritter, G.X. (Eds.) Computational Intelligence Based on Lattice Theory; Springer: Berlin, Germany, 2010. [Google Scholar]
  3. Platzer, A. Logical Foundations of Cyber-Physical Systems; Springer: Berlin, Germany, 2018. [Google Scholar]
  4. Golan, J.S. Semirings and Their applications; Kluwer Academic: Dordrecht, The Netherlands, 1999. [Google Scholar]
  5. Gondran, M.; Minoux, M. Graphs, Dioids and Semirings. New Models and Algorithms; Operations Research Computer Science Interfaces Series; Springer Science+Business Media: New York, NY, USA, 2008. [Google Scholar]
  6. Valverde-Albacete, F.J.; Peláez-Moreno, C. The Singular Valued Decomposition over completed idempotent semifields. Mathematics 2020, 8, 1577. [Google Scholar] [CrossRef]
  7. Moreau, J.J. Inf-convolution, Sous-additivité, convexité des fonctions Numériques. J. Math. Pures et Appl. 1970, 49, 109–154. [Google Scholar]
  8. Cuninghame-Green, R. Minimax Algebra; Number 166 in Lecture Notes in Economics and Mathematical Systems; Springer: Berlin, Germany, 1979. [Google Scholar]
  9. Baccelli, F.; Cohen, G.; Olsder, G.; Quadrat, J. Synchronization and Linearity; Wiley: New York, NY, USA, 1992. [Google Scholar]
  10. Ritter, G.X.; Sussner, P. An Introduction to Morphological Neural Networks. In Proceedings of the 13th International Conference on Pattern Recognition (ICPR’96), Vienna, Austria, 25–29 August 1996; pp. 709–717. [Google Scholar]
  11. Maragos, P. Dynamical systems on weighted lattices: General theory. Math. Control. Signals Syst. 2017, 29, 1–49. [Google Scholar] [CrossRef] [Green Version]
  12. Butkovic, P. Max-algebra: The linear algebra of combinatorics? Linear Algebra Appl. 2003, 367, 313–335. [Google Scholar] [CrossRef] [Green Version]
  13. Butkovič, P. Max-linear Systems. Theory and Algorithms; Monographs in Mathematics; Springer-Verlag London Limited: London, UK, 2010. [Google Scholar]
  14. Cohen, G.; Gaubert, S.; Quadrat, J.P. Duality and separation theorems in idempotent semimodules. Linear Algebra Its Appl. 2004, 379, 395–422. [Google Scholar] [CrossRef] [Green Version]
  15. Valverde-Albacete, F.J.; Peláez-Moreno, C. Towards a Generalisation of Formal Concept Analysis for Data Mining Purposes. Concept Lattices. In Proceedings of the International Conference on Formal Concept Analysis (ICFCA 06), Dresden, Germany, 13–17 February 2006; Volume LNAI 3874, pp. 161–176. [Google Scholar]
  16. Valverde-Albacete, F.J.; Peláez-Moreno, C. Galois Connections between Semimodules and Applications in Data Mining. Formal Concept Analysis. In Proceedings of the 5th International Conference on Formal Concept Analysis, ICFCA 2007, Clermont-Ferrand, France, 12–16 February 2007; Kusnetzov, S., Schmidt, S., Eds.; Springer: Berlin, Germany, 2007; pp. 181–196. [Google Scholar]
  17. Valverde-Albacete, F.J.; Peláez-Moreno, C. Extending conceptualisation modes for generalised Formal Concept Analysis. Inf. Sci. 2011, 181, 1888–1909. [Google Scholar] [CrossRef] [Green Version]
  18. Wille, R. Restructuring lattice theory: An approach based on hierarchies of concepts. In Ordered Sets (Banff, Alta., 1981); Reidel: Dordrecht, The Netherlands; Reidel: Boston, MA, USA, 1982; pp. 445–470. [Google Scholar]
  19. Ganter, B.; Wille, R. Formal Concept Analysis: Mathematical Foundations; Springer: Berlin/Heidelberg, Germany, 1999. [Google Scholar]
  20. Davey, B.; Priestley, H. Introduction to Lattices and Order, 2nd ed.; Cambridge University Press: Cambridge, UK, 2002. [Google Scholar]
  21. Carpineto, C.; Romano, G. Concept Data Analysis; Theory and Applications, John Wiley & Sons, Ltd.: Chichester, UK, 2005. [Google Scholar]
  22. Garg, V.K. Introduction to Lattice Theory with Computer Science Applications; John Wiley & Sons: Hoboken, NJ, USA, 2016. [Google Scholar]
  23. Valverde-Albacete, F.J.; Peláez-Moreno, C. The Linear Algebra in Extended Formal Concept Analysis Over Idempotent Semifields. In Formal Concept Analysis; Bertet, K., Borchmann, D., Cellier, P., Ferré, S., Eds.; Springer: Berlin/Heidelberg, Germany; Springer: Rennes, France, 2017; pp. 211–227. [Google Scholar]
  24. Valverde-Albacete, F.J.; Peláez-Moreno, C. The Linear Algebra in Formal Concept Analysis over Idempotent Semifields. In Formal Concept Analysis; Number 9113 in LNAI; Springer: Berling/Heidelberg, Germany, 2015; pp. 97–113. [Google Scholar]
  25. Valverde-Albacete, F.J.; Peláez-Moreno, C. K-Formal Concept Analysis as linear algebra over idempotent semifields. Inf. Sci. 2018, 467, 579–603. [Google Scholar] [CrossRef]
  26. Gaubert, S. Théorie des Systèmes Linéaires Dans les Dioïdes. Ph.D. Thesis, École des Mines de Paris, Paris, France, 1992. [Google Scholar]
  27. Cohen, G.; Gaubert, S.; Quadrat, J. Kernels, images and projections in dioids. In Proceedings of the Workshop on Discrete Event Systems (WODES), Scotland, UK, 19–21 August 1996; pp. 1–8. [Google Scholar]
  28. Cohen, G.; Gaubert, S.; Quadrat, J.P. Projection and aggregation in maxplus algebra. In Current Trends in Nonlinear Systems and Control; Birkhäuser Boston: Boston, MA, USA, 2006; pp. 443–454. [Google Scholar]
  29. Di Loreto, M.; Gaubert, S.; Katz, R.D.; Loiseau, J.J. Duality Between Invariant Spaces for Max-Plus Linear Discrete Event Systems. SIAM J. Control. Optim. 2010, 48, 5606–5628. [Google Scholar] [CrossRef] [Green Version]
  30. González-Calabozo, J.M.; Valverde-Albacete, F.J.; Peláez-Moreno, C. Interactive knowledge discovery and data mining on genomic expression data with numeric formal concept analysis. BMC Bioinform. 2016, 17, 374. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  31. Peláez-Moreno, C.; García-Moral, A.I.; Valverde-Albacete, F.J. Analyzing phonetic confusions using Formal Concept Analysis. J. Acoust. Soc. Am. 2010, 128, 1377–1390. [Google Scholar] [CrossRef] [PubMed]
  32. Valverde-Albacete, F.J.; González-Calabozo, J.M.; Peñas, A.; Peláez-Moreno, C. Supporting scientific knowledge discovery with extended, generalized Formal Concept Analysis. Expert Syst. Appl. 2016, 44, 198–216. [Google Scholar] [CrossRef] [Green Version]
  33. Burusco, A.; Fuentes-González, R. The study of the L-fuzzy concept lattice. Mathw. Soft Comput. 1994, 3, 209–218. [Google Scholar]
  34. Pollandt, S. Fuzzy-Begriffe: Formale Begriffsanalyse Unscharfer Daten; Springe: Berlin, Germany, 1996. [Google Scholar]
  35. Belohlavek, R. Fuzzy Relational Systems; Foundations and Principles; Springer Science & Business Media: Boston, MA, USA, 2002. [Google Scholar]
  36. Erné, M.; Koslowski, J.; Melton, A.; Strecker, G. A primer on Galois Connections. Annals of the New York Academy of Sciences 1993, 704, 103–125. [Google Scholar] [CrossRef]
  37. Düntsch, I.; Gediga, G. Approximation operators in qualitative data analysis. In Theory and Applications of Relational Structures as Knowledge Instruments; de Swart, H., Ed.; Springer: Berlin, Germany, 2003; Volume 2929 in LNCS, pp. 214–230. [Google Scholar]
  38. Erné, M. Adjunctions and Galois connections: Origins, History and Development. In Galois Connections and Applications; Denecke, K., Erné, M., Wismath, S.L., Eds.; Kluwer Academic: Dordrecht, The Netherlands, 2004; pp. 1–138. [Google Scholar]
  39. Doignon, J.P.; Falmagne, J.C. Knowledge Spaces; Springer: Berlin, Germany, 1998. [Google Scholar]
  40. Falmagne, J.C.; Doignon, J.P. Learning Spaces. Interdisciplinary Applied Mathematics; Springer: Berlin, Germany, 2011. [Google Scholar]
  41. Valverde-Albacete, F.J.; Peláez-Moreno, C.; Cabrera, I.P.; Cordero, P.; Ojeda-Aciego, M. Formal Independence Analysis. In Information Processing and Management of Uncertainty in Knowledge-Based Systems: Applications (IPMU 2018); Medina, J., Ojeda-Aciego, M., Verdegay, J., Perfilieva, I., Bouchon-Meunier, B., Yager, R., Eds.; Number 853 in CCIS; Springer International Publishing: Cham, Switzerland, 2018; pp. 596–608. [Google Scholar]
  42. Valverde-Albacete, F.J.; Peláez-Moreno, C. Further Galois connections between Semimodules over Idempotent Semirings. In Proceedings of the 4th Conference on Concept Lattices and Applications (CLA 07), Montpellier, France, 24–26 October 2007; Diatta, J., Eklund, P., Liquière, M., Eds.; 331 of CEUR WS; 2007; pp. 199–212. [Google Scholar]
  43. Valverde-Albacete, F.J.; Pelaez-Moreno, C. On the Relation between Semifield-Valued FCA and the Idempotent Singular Value Decomposition. In Proceedings of the IEEE International Conference on Fuzzy Systems (FUZZ IEEE 2018), Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–8. [Google Scholar]
  44. Burris, S.; Sankappanavar, H. A Course in Universal Algebra, the Millenium ed.; Self-Published: Washingtonville, NY, USA, 1999. [Google Scholar]
  45. Cohen, G.; Gaubert, S.; Quadrat, J. Linear projectors in the max-plus algebra. In Proceedings of the 5th IEEE Mediterranean Conference on Control and Systems, Paphos, Greece, 24 January 1997; pp. 1–6. [Google Scholar]
  46. Gaubert, S.; Katz, R.D. The tropical analogue of polar cones. Linear Algebra Its Appl. 2009, 431, 608–625. [Google Scholar] [CrossRef] [Green Version]
  47. Valverde-Albacete, F.J.; Peláez-Moreno, C.; Cabrera, I.P.; Cordero, P.; Ojeda-Aciego, M. A Data Analysis Application of Formal Independence Analysis. In Concept Lattices and their Applications (CLA 2018); Ignatov, D.I., Nourine, L., Eds.; Department of Computer Science, Palacky University Olomouc: Olomouc, Czech Republic, 2018; pp. 117–118. [Google Scholar]
  48. Valverde Albacete, F.J.; Peláez-Moreno, C. A Framework for Supervised Classification Performance Analysis with Information-Theoretic Methods. IEEE Trans. Knowl. Data Eng. 2020, 32, 2075–2087. [Google Scholar] [CrossRef]
  49. Valverde-Albacete, J.F.; Peláez-Moreno, C. The Rényi Entropies Operate in Positive Semifields. Entropy 2019, 21, 780. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Figure 1. A domain diagram of the four-fold connection between the spaces implicit in a K ¯ -valued matrix R K ¯ g × m (adapted from [43]). Each of the labels stands in the quadrant where that kind of generalized Galois connection is realized in the diagram. Some maps, like the polar ( · ) R , φ : X B Y φ and its dual polar are missing for clarity.
Figure 1. A domain diagram of the four-fold connection between the spaces implicit in a K ¯ -valued matrix R K ¯ g × m (adapted from [43]). Each of the labels stands in the quadrant where that kind of generalized Galois connection is realized in the diagram. Some maps, like the polar ( · ) R , φ : X B Y φ and its dual polar are missing for clarity.
Mathematics 09 00173 g001
Figure 2. Domain diagram of the four-fold connection between the spaces implicit in a K ¯ -valued matrix R (extended from [43]). Some maps, like the polar · R : X ˜ γ B ̲ Y μ and its dual polar are missing for clarity. The dotted lines highlight the components of the top quadriconcept; similarly, the bottom, meet- and join-dense subsets can be easily spotted (see Section 3.2.2).
Figure 2. Domain diagram of the four-fold connection between the spaces implicit in a K ¯ -valued matrix R (extended from [43]). Some maps, like the polar · R : X ˜ γ B ̲ Y μ and its dual polar are missing for clarity. The dotted lines highlight the components of the top quadriconcept; similarly, the bottom, meet- and join-dense subsets can be easily spotted (see Section 3.2.2).
Mathematics 09 00173 g002
Figure 3. Complements between B ̲ X γ and N ¯ X γ and B ̲ Y μ and N ¯ Y μ This diagram has to be overlaid on Figure 1. (a) The extent-co-extent complement, (b) the intent-co-intent complement.
Figure 3. Complements between B ̲ X γ and N ¯ X γ and B ̲ Y μ and N ¯ Y μ This diagram has to be overlaid on Figure 1. (a) The extent-co-extent complement, (b) the intent-co-intent complement.
Mathematics 09 00173 g003
Figure 4. The tetrahedron of Galois connections of matrix R K g m .
Figure 4. The tetrahedron of Galois connections of matrix R K g m .
Mathematics 09 00173 g004
Figure 5. Schematics of the 4-fold Galois connection of R with K ̲ bias, i.e., X ˜ γ = ( K ̲ g ) ˜ γ (cfr. Figure 2). Note that the increasing sense of the arrows refers now to that of K ̲ , dually-ordered to K ¯ .
Figure 5. Schematics of the 4-fold Galois connection of R with K ̲ bias, i.e., X ˜ γ = ( K ̲ g ) ˜ γ (cfr. Figure 2). Note that the increasing sense of the arrows refers now to that of K ̲ , dually-ordered to K ¯ .
Mathematics 09 00173 g005
Table 1. Comparison of closure and interior (kernel) operators obtained by changing the bias of Formal Concept Analysis ( K -FCA) from K ¯ (left) to K ̲ (right). Note how these are distinct but systematically related operators.
Table 1. Comparison of closure and interior (kernel) operators obtained by changing the bias of Formal Concept Analysis ( K -FCA) from K ¯ (left) to K ̲ (right). Note how these are distinct but systematically related operators.
Type of Fixpointwith Bias in K ¯ with Bias in K ̲
extent π R ( x ) = R ( R x ) π R d ( x ) = R ( R x )
intent π R T ( y ) = R T ( R 1 y ) π R T d ( y ) = R T ( R 1 y )
co-extent κ R 1 ( x ) = R 1 ( R T x ) κ R 1 d ( x ) = R 1 ( R T x )
co-intent κ R ( y ) = R ( R y ) κ R d ( y ) = R ( R y )
Table 2. Special elements of the 4-fold lattices with biases in K ¯ (left column) and K ̲ (right column) (see Section 3.1.5).
Table 2. Special elements of the 4-fold lattices with biases in K ¯ (left column) and K ̲ (right column) (see Section 3.1.5).
Special ElementBias in K ¯ Bias in K ̲
top γ ¯ 4 g = ( g , R T g , g , R g ) γ ¯ 4 g = ( g , R T g , g , R g )
meet dense μ ¯ 4 E m = ( R , R T R 1 , R 1 , R R ) μ ¯ 4 E m = ( R , R T R 1 , R 1 , R R )
join dense γ ¯ 4 E g = ( R R , R T , R 1 R T , R ) γ ¯ 4 E g = ( R R , R T , R 1 R T , R )
bottom μ ¯ 4 m = ( R m , m , R 1 m , m ) μ ¯ 4 m = ( R m , m , R 1 m , m )
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Valverde-Albacete, F.J.; Peláez-Moreno, C. Four-Fold Formal Concept Analysis Based on Complete Idempotent Semifields. Mathematics 2021, 9, 173. https://0-doi-org.brum.beds.ac.uk/10.3390/math9020173

AMA Style

Valverde-Albacete FJ, Peláez-Moreno C. Four-Fold Formal Concept Analysis Based on Complete Idempotent Semifields. Mathematics. 2021; 9(2):173. https://0-doi-org.brum.beds.ac.uk/10.3390/math9020173

Chicago/Turabian Style

Valverde-Albacete, Francisco José, and Carmen Peláez-Moreno. 2021. "Four-Fold Formal Concept Analysis Based on Complete Idempotent Semifields" Mathematics 9, no. 2: 173. https://0-doi-org.brum.beds.ac.uk/10.3390/math9020173

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop