Results 31 to 40 of about 807,381 (349)

A cloud Bayesian network approach to situation assessment of scouting underwater targets with fixed‐wing patrol aircraft

open access: yesCAAI Transactions on Intelligence Technology, 2023
The battlefield situation changes rapidly because underwater targets' are concealment and the sea environment is uncertain. So, a great number of situation information greatly increase, which need to be dealt with in the course of scouting underwater ...
Yongqin Sun   +3 more
doaj   +1 more source

Proposition of a modeling and an analysis methodology of integrated reverse logistics chain in the direct chain

open access: yesJournal of Industrial Engineering and Management, 2016
Purpose: Propose a modeling and analysis methodology based on the combination of Bayesian networks and Petri networks of the reverse logistics integrated the direct supply chain.
Faycal Mimouni, Abdellah Abouabdellah
doaj   +1 more source

Non-linear carbon dioxide determination using infrared gas sensors and neural networks with Bayesian regularization [PDF]

open access: yes, 2009
Carbon dioxide gas concentration determination using infrared gas sensors combined with Bayesian regularizing neural networks is presented in this work.
Almeida   +27 more
core   +1 more source

Hybrid Optimization Algorithm for Bayesian Network Structure Learning

open access: yesInformation, 2019
Since the beginning of the 21st century, research on artificial intelligence has made great progress. Bayesian networks have gradually become one of the hotspots and important achievements in artificial intelligence research.
Xingping Sun   +5 more
doaj   +1 more source

Conjunctive Bayesian networks

open access: yesBernoulli, 2007
Published in at http://dx.doi.org/10.3150/07-BEJ6133 the Bernoulli (http://isi.cbs.nl/bernoulli/) by the International Statistical Institute/Bernoulli Society (http://isi.cbs.nl/BS/bshome.htm)
Beerenwinkel, Niko   +2 more
openaire   +4 more sources

A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part

open access: yesFuture Internet, 2023
For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation
Kongpei Wu, Huiqin Qu, Conggui Huang
doaj   +1 more source

A Bayesian Network View on Acoustic Model-Based Techniques for Robust Speech Recognition [PDF]

open access: yes, 2014
This article provides a unifying Bayesian network view on various approaches for acoustic model adaptation, missing feature, and uncertainty decoding that are well-known in the literature of robust automatic speech recognition.
Huemmer, Christian   +3 more
core   +3 more sources

A Bayesian Network Model for Origin-Destination Matrices Estimation Using Prior and Some Observed Link Flows

open access: yesDiscrete Dynamics in Nature and Society, 2014
This paper presents a Bayesian network model for estimating origin-destination matrices. Most existing Bayesian methods adopt prior OD matrixes, which are always troublesome to be obtained.
Lin Cheng   +3 more
doaj   +1 more source

Construction of Monitoring Model and Algorithm Design on Passenger Security during Shipping Based on Improved Bayesian Network

open access: yesThe Scientific World Journal, 2014
A large number of data is needed by the computation of the objective Bayesian network, but the data is hard to get in actual computation. The calculation method of Bayesian network was improved in this paper, and the fuzzy-precise Bayesian network was ...
Jiali Wang, Qingnian Zhang, Wenfeng Ji
doaj   +1 more source

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs [PDF]

open access: yes, 2016
Attack graphs are a powerful tool for security risk assessment by analysing network vulnerabilities and the paths attackers can use to compromise network resources.
Barrère, Martín   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy