<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Bayesian Networks' Development Based on Noisy-MAX Nodes for Modeling Investment Processes in Transport</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Jan Evangelista Purkyne University in Usti nad Labem</institution>
          ,
          <country country="CZ">Czech Republic</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kherson National Technical Unіversity</institution>
          ,
          <addr-line>Kherson</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National University of Water and Environmental Engineering</institution>
          ,
          <addr-line>Rivne</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>This article focuses on the use of Bayesian networks for analyzing the growth relationship of Ukraine's gross domestic product (GDP) from the volume of investment in the transport industry and offers a comparative description of the use of different structural training algorithms. It is shown that Noisy-max nodes as compared to General nodes provide relatively high initial accuracy. General nodes require a repeated validation procedure. When using the Hirerical sampling method, the accuracy of the network result with General nodes remains unchanged, and with Noisy-max nodes, it increases (in our case, by 12.32%). However, Noisy-max nodes entail an increase in time and computational costs.</p>
      </abstract>
      <kwd-group>
        <kwd>Transport industry</kwd>
        <kwd>General nodes</kwd>
        <kwd>Noisy-max nodes</kwd>
        <kwd>Bayesian networks</kwd>
        <kwd>Structural learning</kwd>
        <kwd>Parametric learning</kwd>
        <kwd>Sensitivity analysis</kwd>
        <kwd>Validation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Successful implementation of the investment policy will contribute to the
implementation of one of the main country's economy tasks to increasing the number of main
domestic investment resources sources. This will create the necessary prerequisites
for the production growth and expanded reproduction of GDP in order to increase the
population's well-being.</p>
      <p>Therefore, it would be advisable to determine the informative investment
indicators that have the greatest impact on the dynamics of Ukraine’s GDP. It is necessary
to develop a model of the relationship between capital investment and GDP.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the author defined investment as “the current increase in capital property
values as a result of production activities during a given period,” or as a share of
income for a given period that was not used for consumption.
      </p>
      <p>
        It is believed that investment is the material basis for the economy's structuring.
Solving the problem of investment will mean the beginning of not only the economy's
restructuring but also its stabilization and subsequent growth [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>The term "investment" has several meanings. First, it means the purchase of shares,
bonds with the expectation of certain financial results. Secondly, real assets, for
example, machinery, equipment necessary for the production and sale of any goods. In
the broadest sense, investments provide the mechanism necessary to finance the
growth and development of the country's economy, region, industry or enterprise.</p>
      <p>Successful implementation of the investment policy will contribute to the
implementation of one of the main tasks of the country's economy to increasing the number
of main sources of domestic investment resources. This will create the necessary
prerequisites for the production growth and expanded reproduction of GDP to increase
the population well-being.</p>
      <p>An important problem is the identification of causal relationships between causes
or factors affecting GDP. Therefore, it would be advisable to determine informative
investment indicators that have the greatest impact on the dynamics of Ukraine's
GDP. The results presented in the article concern research on the development of
probabilistic deterministic models using Bayesian networks to identify the factors
affecting investment in the transport industry of Ukraine’s GDP.</p>
      <p>Considering that one of the difficulties in the development of Bayesian networks is
an exponential increase in the parameters number in their conditional probability
tables (CPT), this study proposes a technique for using noisy-MAX nodes to simulate
economic processes.</p>
      <p>The purpose of the study is constructing a Bayesian network model using
noisyMAX nodes for analyzing the dependence of Ukraine's GDP growth on the volume of
investments in the transport industry.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Problem Statement</title>
      <p>For a set of events X i ,i  1, , N that are related, and a set of learning data
D  d1 , ,dn  ,di  xi1 xi2</p>
      <p>xiN , is given. Here the subscript is the observation
amount, and the upper one is the variable amount, n –is the amount of observations,
each observation consists of N  N  2 variables, and each j -th variable
 j  1, , N  has A j  0,1, ,  j 1   j  2 conditions. Based on a given
training sample, you need to build an acyclic graph connecting the event sets
Xi , i=1,…,N . In addition, each BN structure g  G is represented by a set N of
predecessors  P1 , , PN  , that is, for each vertex j  1, , N , P j it is a variety of
parent vertices, such that P j  X 1 , , X N\X  j . In this study, the Bayesian
network of modeling investment processes in transport and their impact on GDP are
built using noisy-MAX nodes. To do this, we have events X i ,i  1, , N that are
affected by the uncertainties of a different nature. And also we have data describing
these events.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Review of the Literature</title>
      <p>
        There is a wide variety of Bayesian networks applications, including design [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
consumer behavior [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], social behavior [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], support for clinical decision making [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ],
system biology [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], ecology [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], and so on.
      </p>
      <p>
        The use of Bayesian networks in socio-economic research is widely considered in
[
        <xref ref-type="bibr" rid="ref8 ref9">8,9</xref>
        ], where they are one of the mathematical tools for analyzing social behavior,
since they allow describing, modeling and predicting any empirical data: quantitative,
qualitative, and also data of mixed nature. Bayesian networks make it possible to use
both probabilities obtained by analytical or statistical methods and expert estimates,
as shown in [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5, 6, 7</xref>
        ].
      </p>
      <p>
        The advantage of using Bayesian networks is their resistance to incomplete,
inaccurate and noisy information. In these cases, the result will reflect the most likely
outcome of events [
        <xref ref-type="bibr" rid="ref10 ref8">8, 10</xref>
        ].
      </p>
      <p>
        One of the main problems of Bayesian networks is the rapid increase in parameters
while increasing the number of parents. To solve this problem, the most widely used
are Noisy-MAX [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ], since they use multivalued variables. This approach has
proven itself in many real-world applications [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13, 14, 15</xref>
        ]). A small amount of
parameters, that will be enough to indicate the entire CPT is a major advantage. This allows
improving the quality of the distributions extracted from the data [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], as well as
reducing the spatial and temporal complexity of the algorithms for the BN [
        <xref ref-type="bibr" rid="ref17 ref8">8,17</xref>
        ].
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Materials and Methods</title>
      <p>A pair &lt;G, В&gt; called a Bayesian network (BN), when the first part of G is a acyclic
directed graph corresponding to random variables. When each variable is autonomous
of its parents in G, so a graph is written as a composition of autonomous conditions.
The second part of the pair, B, is the composition of parameters defining the network.
It composed of parameters Qxi | pa(Xi )  P(xi | pa(Xi )) for each possible xi value from
Xi and pa( X i ) from Pa( X i ) , where Pa( X i ) means the variable Xi parents set in G .
Each variable Xi in graph G is suggested as a vertex. If we consider more than only
one graph, then we use the notation to identify the parents PaG ( X i ) in graph G.</p>
      <p>The</p>
      <p>BN’s cumulative probability</p>
      <p>B is determined by the equation
PB ( X 1,..., XN )  iN1 PB (Xi | Pa(Xi )) .</p>
      <p>The BN represents a model for getting probabilistic dependencies, as well as the
absence of these dependencies. At the same time, the A→B relationship can be
causal, when event A causes B to occur. So that is, at the time, when there is a mechanism
by which value is accepted by A affects the value adopted by B. When all BN’s
connections are causal, so BN is called causal.</p>
      <p>From the existing discretization methods (hierarchical discretization, discretization
on the same width of classes, discretization on the same number of points inside the
classes) for the existing data set a hierarchical discretization method was chosen
[18,19.].</p>
      <p>Structural methods of BN training are algorithms, such as: the Bayesian Search, the
Essential Graph Search, the TAN. In our study, the Greedy Thick Thinning algorithm
is used.</p>
      <p>
        The essence of the Greedy algorithm for constructing the BN structure is as
follows. The structure learning algorithm, called Greedy Thick Thinning (GTT), is found
on the approach of Bayesian search. GTT was proposed in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The GTT algorithm
begins with the construction of an empty graph and then the stepwise multiple
additions of an arc. This process occurs without creating a cycle.
      </p>
      <p>Arcs are added to maximize the marginal likelihood P (D | S). This process is
repeated until the addition of the arc leads to a positive increase. This phase is called
“thickening”.</p>
      <p>Then the arcs are removed step by step until the removal of the arc leads to a
positive increase in P (D | S). This phase is called “thinning”. The algorithm is quite
effective due to the fact that it is exposed to the trap of local maxima. In GTT, you can use
two priorities. The priority of BDeu provides an equal score through the equivalent of
Marcov’s classes. The priority of K2 is constant in all variables and, as a rule, is used
to maximize P(G|D) when directly searching for a space of graphs.</p>
      <p>
        Validation of the developed network was carried out according to the algorithm of
maximizing the expectation, which was proposed for the first time in 1977 in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
The algorithm finds local optimal estimates of the maximum likelihood of parameters.
If the values of all nodes are known, then training (at some step M) would be simple,
since we would have to have all the necessary information.
      </p>
      <p>Therefore, at stage E, calculations of the expected likelihood value (expectation of
the likelihood) are made, including latent variables, as if we were able to observe
them. In step M, the maximum values of parameters’ likelihood are calculated
(maximum likelihood estimates) of the parameters using the maximization of the expected
likelihood values obtained in step E. Next, the algorithm again performs step E using
the parameters obtained in step M and so on.</p>
      <p>
        A whole series of such algorithms was developed, based on the algorithm of
maximizing the expectation [
        <xref ref-type="bibr" rid="ref21 ref22 ref23">21-23</xref>
        ]. For example, the structural algorithm for maximizing
the mathematical expectation (structural EM algorithm) combines a standard
algorithm for maximizing the mathematical expectation to optimize parameters, and an
algorithm for the structural search of a selection model.
      </p>
      <p>This algorithm builds networks using penalty probabilistic values, which include
values, derived from Bayesian information criteria, the principle of minimum
description length, and others.</p>
      <p>
        Noisy-MAX node is made up of a child node Y, accepting
nY values that may be
tagged from 0 tо nY 1 , and N parents, Pa Y   X1,, X N  , representing causes of
Y. If Xi =0 , it means the absence of X i . If all the reasons are missing, the result is
also missing, then the Noisy-MAX are determined according to the formula [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]:
      </p>
      <p>P Y  0 | Xi  0i    1
P Y  y | x   P Y  y | Xi  xi , X j  0j ,ji  </p>
      <p>i
x represents a special combination of the parents of Y, x   x1,..., xN  . The
probabilities that the result will take a certain value of y, in the case when X i equals a certain
value of xi , provided that all the other reasons for Y are absent , are the parameters
for the link Xi  Y :
If the degrees’ maximum produced by X acted independently, the degree reached by
Y is determined by the formula:
cyxi  P Y  y | Xi  xi X j  0j,ji  
(1)
(2)
(3)
(4)
(5)
(6)
5</p>
    </sec>
    <sec id="sec-5">
      <title>Experiments and Results</title>
      <p>In developing the BN, the Genie 2.3 software environment was used. The initial
nodes type is General, each node has 5 states from s1 to s5.</p>
      <p>If Xi takes nXi values, so according to formula 1, the amount of parameters required
for the link Xi  Y will be nXi 1  nY 1 . This model needs a reference to only
one parameter, if all the variables included in Noisy are binary. We can determine the
new parameters using the following formula:
the formula 2 can be represented as:</p>
      <p>Cyxi  P Y  y | Xi  xi , X j  0j , ji   cyxi ,
y
y
P Y  y | x1 , , xn   Cyxi ,
i
CPT can be obtained given the following conditions:</p>
      <p>P Y  0 | x if y  0
P  y | x  </p>
      <p>P Y  y | x  P Y  y 1| x if y  0</p>
      <p>The following macroeconomic indicators for the period from 2012 (1st quarter) to
2017 (IV quarter) - 24 points were taken as experimental data for calculating the
dependence of Ukraine's GDP growth from the volume of investment in the transport
industry:
x1 - the volume of investments in land and pipeline transport of actual prices;
x2 - the volume of investment in water transport;
x3 - the volume of investment in air transport;
x4 - the volume of investments in warehousing and auxiliary activities in the field
of transport;
x5 - the volume of investments in postal and courier activities.</p>
      <p>The variety of available data can be divided into two sets: 16 measurements is
training sample A, 8 measurements is test sample B (Table 1).
9455,6
56,9
74,6
372,2
340,4
2852,1
5640,6
53,7
285,3
833130
894022
At the first stage of the available in the GeNie2.3 Academic software environment,
the methods of structural learning select the appropriate method. Figure 1 presents the
results of selection.
As a result of the experiment, a Bayesian network consisting of 6 nodes was obtained.
After parametric learning, primary validation was carried out. The model has
achieved 22.9% level of accuracy during the test. After revalidation, the accuracy of
the model was 54.34%.</p>
      <p>In the next step, we changed the type of all nodes to Noisy with five states from s1
to s5, the resulting node Y. The network remains the same, the data file also does not
change. We conduct parametric learning, primary validation and sensitivity analysis.
Comparison of accuracy is presented in the table 2:
Next, we apply Hirerical discretization method. We use the Greedy algorithm, we
repeat all the steps: structural training, parametric training, validation, sensitivity
analysis and re-validation. the accuracy of the result remained unchanged 54,34%.
Comparison of accuracy after changing the sampling method is given in table 3.</p>
      <p>We apply Hirerical discretization method now to Noisy nodes, then using the
Greedy algorithm, we repeat all the steps: structural learning, parametric learning,
validation, sensitivity analysis and repeated validation. The accuracy of the entire
network decreased slightly - 21.21%, but the accuracy of the result was higher by
12.32% and amounted to 66.66%.
During the selection of the structural learning algorithm, it was revealed that the
Greedy algorithm turned out to be an adequate method when working with the
existing data set.</p>
      <p>With Noisy-max nodes, the required resulting accuracy is achieved immediately
after the initial validation. This suggests that for a network with this type of nodes
there is no need for sensitivity analysis and re-validation (Table 2).</p>
      <p>When using the Hirerical discretization method, the accuracy of the result with the
General nodes remains unchanged, and with Noisy-max nodes, it increases by 12.32%
(Table 3).</p>
      <p>When using General nodes, the EM execution time during the validation process
was 13 seconds. For Noisy nodes, the EM algorithm spent three times as much
computing time (37 seconds). On small data sets with a small BN size, such time costs can
be neglected. However, as the network increases, the time costs (and hence the
computing power) will be tangible and this will have to be taken into account.
7</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>Noisy-max nodes, compared to General nodes, provide relatively high initial
accuracy. General nodes require a repeated validation procedure. When using the Hirerical
discretization method, the accuracy of the network result with General nodes remains
unchanged, and with Noisy-max nodes, it increases (in our case, by 12.32%).
However, Noisy-max nodes entail an increase in time and computational costs.</p>
      <p>In future studies, it is planned to use the dynamic Bayesian network approach in
order to trace the levels of key indicators in different time slices.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Keynes</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          :
          <article-title>The General Theory of Employment</article-title>
          .
          <source>In: The Quarterly Journal of Economics</source>
          (
          <year>1937</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Zvi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kane</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bodie</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <source>Essentials of Investments Fourth Edition, Jan</source>
          <volume>1</volume>
          , (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Andreassen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woldbye</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falck</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andersen</surname>
            ,
            <given-names>S.K.</given-names>
          </string-name>
          :
          <article-title>MUNIN - A causal probabilistic network for interpretation of electromyographic findings</article-title>
          .
          <source>In: Proceedings of the International Joint Conference on Artificial Intelligence</source>
          , Milan, Italy,
          <fpage>366</fpage>
          -
          <lpage>372</lpage>
          . (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Castillo</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gutierrez</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hadi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Sensitivity analysis in discrete Bayesian networks</article-title>
          .
          <source>IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans</source>
          , Vol.
          <volume>27</volume>
          (
          <issue>4</issue>
          ),
          <fpage>412</fpage>
          -
          <lpage>423</lpage>
          . (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Cooper</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herskovits</surname>
          </string-name>
          , E.:
          <article-title>A Bayesian method for the induction of probabilistic networks from data</article-title>
          ,
          <source>Machine Learning 9</source>
          ,
          <fpage>309</fpage>
          -
          <lpage>347</lpage>
          . (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. Cheng, J.,
          <string-name>
            <surname>Druzdzel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <string-name>
            <surname>AIS-BN</surname>
          </string-name>
          :
          <article-title>An Adaptive Importance Sampling Algorithm for Evidential Reasoning in Large Bayesian networks</article-title>
          .
          <source>In: Journal of Artificial Intelligence Research (JAIR)</source>
          , Vol.
          <volume>13</volume>
          ,
          <fpage>155</fpage>
          -
          <lpage>188</lpage>
          . (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dempster</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laird</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rubin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Maximum likelihood from incomplete data via the EM algorithm</article-title>
          .
          <source>J. Roy. Stat. Soc.</source>
          , Vol.
          <volume>39</volume>
          (
          <issue>B</issue>
          ),
          <volume>1</volume>
          -
          <fpage>38</fpage>
          . (
          <year>1977</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Díez</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galán</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Efficient computation for the noisy MAX, Int</article-title>
          .
          <source>J. Int. Syst.</source>
          , Vol.
          <volume>18</volume>
          /2,
          <fpage>165</fpage>
          -
          <lpage>177</lpage>
          . (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kayaalp</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cooper</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A Bayesian network Scoring Metric That Is Based on Globally Uniform Parameter Priors</article-title>
          ,
          <fpage>251</fpage>
          -
          <lpage>258</lpage>
          . (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Kjaerulff</surname>
          </string-name>
          , U., van der Gaag, J.:
          <article-title>Making sensitivity analysis computationally efficient</article-title>
          .
          <source>In: Proceedings of the Sixteenth Conference Uncertainty in Artificial Intelligence (UAI)</source>
          . San Francisco, CA: Morgan Kaufmann Publishers,
          <fpage>317</fpage>
          -
          <lpage>325</lpage>
          . (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Henrion</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kanal</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levitt</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lemmer</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Some practical issues in constructing belief networks</article-title>
          .
          <source>In: Uncertainty in Artificial Intelligence</source>
          <volume>3</volume>
          , New York: Elsevier,
          <fpage>161</fpage>
          -
          <lpage>173</lpage>
          . (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Díez</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Parameter adjustment in Bayes networks. The generalized noisy OR-gate</article-title>
          .
          <source>In: Proc. 9th Conf. Uncertainty Artif</source>
          . Intell., Washington, DC,
          <fpage>99</fpage>
          -
          <lpage>105</lpage>
          . (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Díez</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mira</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iturralde</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zubillaga</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>DIAVAL, a Bayesian expert system for echocardiography</article-title>
          .
          <source>In: Artif. Intell. Med</source>
          ., Vol.
          <volume>10</volume>
          /1,
          <fpage>59</fpage>
          -
          <lpage>73</lpage>
          . (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Pradhan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Provan</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Middleton</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Henrion</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Knowledge engineering for large belief networks</article-title>
          .
          <source>In: Proc. 10th Annu. Conf. UAI</source>
          , San Francisco, CA,
          <fpage>484</fpage>
          -
          <lpage>490</lpage>
          . (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Shwe</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Middleton</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heckerman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Henrion</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horvitz</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cooper</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Probabilistic diagnosis using a reformulation of the INTERNIST-1/QMR knowledge base: I. The probabilistic model and inference algorithms</article-title>
          .
          <source>In: Methods Inf. Med</source>
          .,Vol.
          <volume>30</volume>
          / 4,
          <fpage>241</fpage>
          -
          <lpage>255</lpage>
          . (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Onisko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Druzdzel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wasyluk</surname>
          </string-name>
          , H.:
          <article-title>Learning Bayesian network parameters from small data sets: Application of noisy-OR gates</article-title>
          .
          <source>In: Int. J. Approx. Reason.</source>
          , Vol.
          <volume>27</volume>
          /2,
          <fpage>165</fpage>
          -
          <lpage>182</lpage>
          . (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , N.,
          <string-name>
            <surname>Poole</surname>
          </string-name>
          , N.:
          <article-title>Exploiting causal independence in Bayesian network inference</article-title>
          .
          <source>In: J. Artif. Intell. Res.</source>
          , Vol.
          <volume>5</volume>
          /1,
          <fpage>301</fpage>
          -
          <lpage>328</lpage>
          . (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Beinlich</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Suermondt</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chavez</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cooper</surname>
            ,
            <given-names>G:</given-names>
          </string-name>
          <article-title>The ALARM monitoring system: A case study with two probabilistic inference techniques for belief networks</article-title>
          ,
          <source>In: Proceedings of the Second European Conference on Artificial Intelligence in Medicine, London, England</source>
          ,
          <fpage>247</fpage>
          -
          <lpage>256</lpage>
          . (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Darwiche</surname>
          </string-name>
          , N.:
          <article-title>A differential approach to inference in Bayesian networks</article-title>
          .
          <source>In Uncertainty in Artificial Intelligence: Proceedings of the Sixteenth Conference (UAI</source>
          <year>2000</year>
          ), San Francisco, CA: Morgan Kaufmann Publishers,
          <fpage>123</fpage>
          -
          <lpage>132</lpage>
          . (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Friedman</surname>
          </string-name>
          , N.:
          <source>The Bayesian structural EM algorithm / Fourteenth conference on Uncertainty in Artificial Intelligence (UAI'98)</source>
          , Madison, Wisconsin, USA,
          <fpage>24</fpage>
          -
          <issue>26</issue>
          <year>July</year>
          ,
          <year>1998</year>
          . - SF.: Morgan Kaufmann,
          <fpage>129</fpage>
          -
          <lpage>138</lpage>
          . (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Henrion</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Some practical issues in constructing belief networks</article-title>
          . In: Kanal L.N.,
          <string-name>
            <surname>Levitt</surname>
            <given-names>T.S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Lemmer</surname>
            <given-names>J.F</given-names>
          </string-name>
          . (Eds.),
          <source>Uncertainty in Artificial Intelligence</source>
          <volume>3</volume>
          (
          <issue>NorthHolland</issue>
          , Amsterdam,
          <fpage>161</fpage>
          -
          <lpage>173</lpage>
          . (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>van der Gaag</surname>
            ,
            <given-names>L. C.</given-names>
          </string-name>
          , Coup´ e, V. M.:
          <article-title>Sensitivity analysis for threshold decision making with Bayesian belief networks</article-title>
          . In Lamma, E., and
          <string-name>
            <surname>Mello</surname>
          </string-name>
          , P., eds.,
          <source>AI*IA 99: Advances in Artificial Intelligence, Lecture Notes in Artificial Intelligence</source>
          . Berlin: Springer-Verlag.
          <fpage>37</fpage>
          -
          <lpage>48</lpage>
          . (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kwok</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yeung</surname>
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Surrogate maximization (minimization) algorithms for AdaBoost and the logistic regression model</article-title>
          .
          <source>In: Proceedings of the twenty-first international conference on machine learning (ICML)</source>
          ,
          <volume>117</volume>
          p. (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>