249 Hits in 5.2 sec

Modeling Information System Availability by using Bayesian Belief Network Approach

Semir Ibrahimovic, Nijaz Bajgoric
2016 Interdisciplinary Description of Complex Systems  
Software Quality Journal 20(2), 369-394, 2012) based on a thorough review of several dimensions of the information system availability, we proposed a modified set of determinants.  ...  Examples of such entities include process industries, telecommunications, healthcare, energy, banking, electronic commerce and a variety of cloud services.  ...  Wei et al. developed an integrated process, based on BBN, for efficient IT services management [51].  ... 
doi:10.7906/indecs.14.2.2 fatcat:wypwkp6nqvhwfia6gxgjmz6wd4

Flood Resilience of Housing Infrastructure Modeling and Quantification Using a Bayesian Belief Network

Mrinal Kanti Sen, Subhrajit Dutta, Golam Kabir
2021 Sustainability  
Hence, it is necessary to build a resilience model for housing infrastructure based on a realistic dataset.  ...  In this work, a Bayesian belief network (BBN) model was developed for housing infrastructure resilience.  ...  Acknowledgments: The authors acknowledge the support of the District Disaster Management Authority (DDMA), Assam, India, for providing the information of flood-vulnerable places of Barak Valley in Northeast  ... 
doi:10.3390/su13031026 fatcat:wxwqhygm5faqjn7ud3ozuusyha

Reinventing GTE with information technology

B. Brandau, T. Confrey, A. D'Silva, C.J. Matheus, R. Weihmayer
1999 Computer  
In response to shifting business demands, evolving information technologies play a key role in first reengineering and then reinventing GTE.  ...  GTE took a two-pronged approach in its response to this mandate. First, we developed a secure software solution that handles those CLEC requests that can be automated.  ...  In response to these challenges, telecommunications companies must take a new approach to conducting business.  ... 
doi:10.1109/2.751329 fatcat:7t4zeevqr5cixlkadwluxbanmm

BN Applications in Operational Risk Analysis: Scope, Limitations and Methodological Requirements [chapter]

Paolo Trucco, Maria Chiara
2012 Bayesian Networks  
There are many uncertainties in development processes for products of processes like the uncertainties in estimating project completion time, the project needs for supply the quality of the output etc.  ...  Trucco et al. (2008b) applied the proposed methodology to identify and analyse the effectiveness of different organizational and behaviour-based measures for improving occupational safety in a leading  ...  Third, because the model has both causal and probabilistic semantics, it is an ideal representation for combining prior knowledge (which often comes in a causal form) and data.  ... 
doi:10.5772/38858 fatcat:nzrhnjkqnfhyvfvepmywemolfi

Facing Fault Management as It Is, Aiming for What You Would Like It to Be [chapter]

Roy Sterritt
2002 Lecture Notes in Computer Science  
and (ii) the induction of Bayesian Belief Networks (BBNs) for a complete 'intelligent' approach.  ...  In this paper two key fault management approaches are considered: (i) rule discovery to attempt to present fewer symptoms with greater diagnostic assistance for the more traditional rule based system approach  ...  The author is greatly indebted to the Industrial Research and Technology Unit (IRTU) (Start 187-The Jigsaw Programme, 1999-2002) for funding this work jointly with Nortel Networks.  ... 
doi:10.1007/3-540-46019-5_3 fatcat:3nizbbjohvh3ranie5ydswv4hy

A rationale-based architecture model for design traceability and reasoning

Antony Tang, Yan Jin, Jun Han
2007 Journal of Systems and Software  
Large systems often have a long life-span and their system and software architecture design comprise many intricately related elements.  ...  Research into design rationale in the past has focused on argumentation-based design deliberations. Argumentation-based design rationale models provide an explicit representation of design rationale.  ...  This feedback loop could improve the decision making process and identify areas where design estimations are inferior.  ... 
doi:10.1016/j.jss.2006.08.040 fatcat:4wpryjke6fdj7lts3opfwwhohm

Towards a Comprehensive Framework for Climate Change Multi-Risk Assessment in the Mining Industry

Mavrommatis, Damigos, Mirasgedis
2019 Infrastructures  
The framework estimates the climate change risks in economic terms by modeling the main activities that a mining company performs, in a probabilistic model, using Bayes' theorem.  ...  In this study, a comprehensive framework is proposed for climate change multi-risk assessment at the local level customized for the needs of the mining industry.  ...  Finally, a future improvement of the model is the development of a web-based decision support system.  ... 
doi:10.3390/infrastructures4030038 fatcat:aitkgogsvrerhfia4myr4vs34q

Quantum Key Distribution

Miralem Mehic, Marcin Niemiec, Stefan Rass, Jiajun Ma, Momtchil Peev, Alejandro Aguado, Vicente Martin, Stefan Schauer, Andreas Poppe, Christoph Pacher, Miroslav Voznak
2020 ACM Computing Surveys  
software-defined QKD networking approach.  ...  Mehic et al. application on a broader scale.  ...  The discussion was strongly improved through their careful reading and constructive input.  ... 
doi:10.1145/3402192 fatcat:w53ugulq4ne3rcjuvmh7mg3rqi

Minority report in fraud detection

Clifton Phua, Damminda Alahakoon, Vincent Lee
2004 SIGKDD Explorations  
Its originality lies in the use of a single meta-classifier (stacking) to choose the best base classifiers, and then combine these base classifiers' predictions (bagging) to improve cost savings (stacking-bagging  ...  Results show that, given a fixed decision threshold and cost matrix, the partitioning and multiple algorithms approach achieves marginally higher cost savings than varying the entire training data set  ...  Rasika Amarasiri for his technical help and anonymous reviewers for their suggestions which led to more insights.  ... 
doi:10.1145/1007730.1007738 fatcat:z5sphecnpnbptbsrhr3fyzpq5i

Data Mining Techniques in Fraud Detection

Rekha Bhowmik
2008 Journal of Digital Forensics, Security and Law  
There exist a number of data mining algorithms and we present statistics-based algorithm, decision treebased algorithm and rule-based algorithm.  ...  We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.  ...  A single metaclassifier (Phua et al. 2004 ) is used to select the best base classifiers, and then combined with these base classifiers' predictions to improve cost savings (stackingbagging).  ... 
doi:10.15394/jdfsl.2008.1040 fatcat:uxlw5a6of5fszpuyca36bzopnm

Software Reliability Engineering: A Roadmap

Michael R. Lyu
2007 Future of Software Engineering (FOSE '07)  
Moreover, credible software reliability models are required to track underlying software failure processes for accurate reliability analysis and forecasting.  ...  In order to estimate as well as to predict the reliability of software systems, failure data need to be properly measured by various means during software development and operational phases.  ...  BBNs provide an attractive formalism for different software cases.  ... 
doi:10.1109/fose.2007.24 dblp:conf/icse/Lyu07 fatcat:oq45czyelfg6xn7su5uakybf2y


Vincent S. Tseng, Jia-Ching Ying, Che-Wei Huang, Yimin Kao, Kuan-Ta Chen
2015 Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD '15  
Due to limitation of information provided by telecommunication records, such classifier-based approaches for fraudulent phone call detection normally do not work well.  ...  In this paper, we develop a graphmining-based fraudulent phone call detection framework for a mobile application to automatically annotate fraudulent phone numbers with a "fraud" tag, which is a crucial  ...  Compared with the best of classifier-based fraud detection approaches, our proposed HITSbased approach achieve 26.4% improvement rate (i.e., (0.829 − 0.656)/ 0.656).  ... 
doi:10.1145/2783258.2788623 dblp:conf/kdd/TsengYHKC15 fatcat:djpxjkookradpbom3gapamggbi


Mykola Tymošenko, Kateryna Golovach
2018 Management Theory and Studies for Rural Business and Infrastructure Development  
The results of the implementation of the Bayesian network with the help of Netica software for deciding on the sustainable development of village councils in the future based on the questionnaire data  ...  The aim of the research is to provide a scientific basis for the need of using the modeling with the help of neural network technologies and to build a Bayesian belief network to make a decision on the  ...  Zare, Zare and Fallahnezhad (2016) implemented a system for evaluating software development projects based on optimal Bayesian networks.  ... 
doi:10.15544/mts.2018.25 fatcat:cg75udi2ejfqlchib3qk4kvr6e

Porting industrial codes and developing sparse linear solvers on parallel computers

Michel J. Dayde, Iain S. Duff
1995 Computing Systems in Engineering  
We discuss the use of numerical libraries as a way of developing portable memory, virtual shared memory, and distributed memory multiprocessors, and networks and when developing portable parallel software  ...  software by considering the parallel solution of sparse linear systems of equations.  ...  These directives, and for the telecommunication code using a vectorizable 1D FFT.  ... 
doi:10.1016/0956-0521(95)00033-x fatcat:fwvkd3wkdvagrjdhra7latjcme

Application of Data Mining Techniques using Internet of Things

Sania Talha, Devunuri Sharanya, Dr V Sravan Kumar
2021 Zenodo  
This paper explores a systematic review of various data mining models as well as its applications in the Internet of things along with its advantages and disadvantages.  ...  The Bayesian Belief Network (BBN) and Artificial Neural Network (ANN) study used the STAGE algorithm for BBN in fraud detection and back propagation for ANN.  ...  [7] During operation user net is adapted to a specific user based on emerging data.  ... 
doi:10.5281/zenodo.5044990 fatcat:owa4c6nstjeyhmswihrdmq3mw4
« Previous Showing results 1 — 15 out of 249 results