全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2015 

基于多模块贝叶斯网络的恐怖袭击威胁评估
Terrorism threat assessment with multi-module Bayesian network

DOI: 10.7523/j.issn.2095-6134.2015.02.017

Keywords: 恐怖袭击,威胁评估,多模块,贝叶斯网络,推理
terrorist attacks
,threat assessment,multi-module,Bayesian network,inference

Full-Text   Cite this paper   Add to My Lib

Abstract:

摘要 通过考察恐怖袭击事件可能造成的后果, 针对恐怖袭击事件评估信息的多样性、不确定性及模糊性, 提出用贝叶斯网络方法对恐怖袭击威胁进行评估, 从而为反恐决策者提供决策支持, 以减少恐怖袭击所造成的影响.针对恐怖袭击事件的复杂性, 提出多模块贝叶斯网络的恐怖袭击威胁评估模型, 并对多模块贝叶斯网络的结构学习、参数学习和推理进行研究, 提出多模块贝叶斯网络的推理算法.最后, 给出恐怖袭击威胁度的计算方法, 并对多模块贝叶斯网络的威胁评估模型进行实例分析.实例表明, 基于多模块贝叶斯网络的恐怖袭击威胁评估模型, 能有效评估恐怖袭击事件的威胁程度.

References

[1]  Liu K F R, Lu C F, Chen C W, et al. Applying Bayesian belief networks to health risk assessment[J]. Stochastic Environmental Research and Risk Assessment, 2012, 26(3): 451-465.
[2]  Singh S, Allanach J, Tu H, et al. Stochastic Modeling of a Terrorist Event via the ASAM system [C]//Systems, Man and Cybernetics, 2004 IEEE International Conference on. IEEE, 2004, 6: 5 673-5 678.
[3]  Su X, Bai P, Du F, et al. Application of Bayesian networks in situation assessment [M]. Intelligent Computing and Information Science, Springer Berlin Heidelberg, 2011: 643-648.
[4]  Julia Flores M, Nicholson A E, Brunskill A, et al. Incorporating expert knowledge when learning Bayesian network structure: a medical case study[J]. Artificial Intelligence in Medicine, 2011, 53(3): 181-204.
[5]  Mahoney S M, Laskey K B. Constructing situation specific belief networks [C]//Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann Publishers Inc, 1998: 370-378.
[6]  Elzinga P, Poelmans J, Viaene S, et al. Terrorist threat assessment with formal concept analysis [C]//Intelligence and Security Informatics (ISI), 2010 IEEE International Conference on. IEEE, 2010: 77-82.
[7]  Bouckaert R R. Optimizing causal orderings for generating DAGs from data [C]//Proceedings of the Eighth International Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann Publishers Inc, 1992: 9-16.
[8]  Lauritzen S L, Spiegelhalter D J. Local computations with probabilities on graphical structures and their application to expert systems[J]. Journal of Royal Statistical Society, 1988, 50(2):157-224.
[9]  沈阳武,彭晓涛,施通勤,等. 基于最优组合权重的电能质量灰色综合评价方法[J]. 电力系统自动化, 2012,36(10): 67-73.
[10]  Baesens B, Verstraeten G, Van den Poel D, et al. Bayesian network classifiers for identifying the slope of the customer lifecycle of long-life customers[J]. European Journal of Operational Research, 2004, 156(2): 508-523.
[11]  王双成. 贝叶斯网络学习、推理与应用[M].上海:立信会计出版社,2010.
[12]  <p> 李健和,王存奎,梅建明,等. 当代恐怖主义的特征与发展趋势[J]. 中国人民公安大学学报: 社会科学版, 2008(3):1-7.
[13]  Geng R, Xu G. Application of AHP FSE method in the network course quality evaluation[J]. Procedia Engineering, 2011, 15: 4 136-4 141.
[14]  Li H, Chen Z, Chen S. The study of evaluation of the quality of the accounting information based on the fuzzy-AHP model[J]. Advances in Services Science and Services Information Technology (Set), 2014, 52: 185.
[15]  Pradhan B. An assessment of the use of an advanced neural network model with five different training strategies for the preparation of landslide susceptibility maps[J]. Journal of Data Science, 2011, 9(1): 65-81.
[16]  Weber P, Medina-Oliva G, Simon C, et al. Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas[J]. Engineering Applications of Artificial Intelligence, 2012, 25(4): 671-682.
[17]  Allanach J, Tu H, Singh S, et al. Detecting, tracking, and counteracting terrorist networks via hidden Markov models [C]//Aerospace Conference, 2004, Proceedings, IEEE. IEEE, 2004: 5.
[18]  叶跃祥,糜仲春,王宏宇,等. 基于贝叶斯网络的不确定环境下多属性决策方法[J]. 系统工程理论与实践,2007(4):107-113.
[19]  Laskey K B, Mahoney S M, Wright E. Hypothesis management in situation-specific network construction [C]//Proceedings of the Seventeenth Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann Publishers Inc, 2001: 301-309.
[20]  Cooper G F, Herskovits E. A Bayesian method for the induction of probabilistic networks from data[J]. Machine Learning, 1992, 9(4): 309-347.
[21]  赵晓风. 恐怖主义活动的社会心理危害及对策探讨[J]. 理论导刊,2009 (11):48-50.
[22]  Pearl J. Fusin, propagation, and structuring in belief networks[J]. Artificial Intelligence, 1986, 29: 241-288.
[23]  de Campos C P, Cozman F G. Complexity of inferences in polytree-shaped semi-qualitative probabilistic networks [C]//AAAI Conference on Artificial Intelligence. 2013: 217-223.
[24]  鞠彦兵,王爱华. 基于贝叶斯网络的突发事件影响度研究[J]. 自然灾害学报,2011,20(5):40-46.</p>

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133