Application of Analytical Hierarchy Process and Bayesian Belief Networks for Risk Analysis

Size: px
Start display at page:

Download "Application of Analytical Hierarchy Process and Bayesian Belief Networks for Risk Analysis"

Transcription

1 Volume 2 Application of Analytical Hierarchy Process and Bayesian Belief Networks for Risk Analysis A. Ahmed, R. Kusumo 2, S Savci 3, B. Kayis, M. Zhou 2 and Y.B. Khoo 2 School of Mechanical and Manufacturing Engineering, University of New South Wales, Sydney, NSW 2052 AUSTRALIA {ammar, b.kayis}@unsw.edu.au 2 Manufacturing and Infrastructure Technology, CSIRO, Melbourne, VIC 3072 AUSTRALIA {Raden.Kusumo, Mingwei.Zhou, Yongbing.Khoo}@csiro.au 3 Boeing-Hawker de Havilland, PO Box 30, Bankstown, NSW 2200 AUSTRALIA Sule.Savci@boeing.com Abstract Concurrent engineering or integrated product development is complex and challenging to manage while aiming reduction of the number of design iterations between different steps of the new product development (NPD) process. The efficiency and reliability of this concurrent engineering approach can be enhanced through risk management principles applied to project management. This paper presents a framework developed for an intelligent risk management system based on the Australia/ New Zealand Risk Management Standard (AS/NZS 4360) ane conceptualisation of a risk management tool consisting of several modules addressing establishment of the risk assessment context, risk identification, risk assessment, risk evaluation and risk mitigation planning. These modules are linked to each other through a database providing risk analysis through quantitative and multi-criteria decision tools using the Analytical Hiererchy Process (AHP) and Bayesian Belief Networks(BBN). This paper presents the conceptualisation of AHP and BBN based decision support modules in the Intelligent Risk Mapping and Assessment Systems (IRMAS TM ) for risk analysis.. Introduction The risk management process as applied to project management for new product development has been adopted from the Australian Risk Management Standard and is presented in figure (AS/NZS 4360, 999). It is as much about identifying opportunities as Copyright 2005

2 s avoiding or mitigating losses (Ahmed, Kayis, et.al., 2003). According to the standard, the governing body must develop and implement systems which: Are fully supported by management and backed up by an organisational policy and framework, which are fully communicated to all affected parties; Result in an effective program for the management of risk; Ensure that the risk management process is adopted by those in charge of projects; and Ensure that the risk management activities remain effective and relevant by way of regular monitoring and review. criteria Establish the context structure Identify risks Analyse risks leve l of risk Assess risks risk acc eptable? No Treat risks r esidual risk acceptable? Y Y accept accept Establish the context: Decide the structure of the process Develop criteria against which risk will be assessed Identify risks: Generate a list of events which can happen Consider possible causes and scenarios Analyse risks: Estimate Likelihood and consequences Combine these elements to a level of risk Assess risks: Compare level of risk against criteria Prioritise risks and identify management priorities Treat risks: Identify and evaluate treatment options Prepare and implement treatment plans No Figure. The Risk Management Process and Tasks (AS/NZS 4360, 999) The development of a risk management framework such as the one employed in the development of Intelligent Risk Mapping and Assessment System (IRMAS TM ) presents several pre-requisites, i.e. an understanding of the risk management process, the concurrent engineering (CE) product development process, the environment in which organisations conduct business and manage projects, an understanding of the overall mix of products and processes and benchmarks for such activities (Ahmed, Amornsawadwatana, et.al., 2003). 2. Risk Analysis The risk management process within a risk management tool such as IRMAS TM can be summarised as follows. Provide an interrogratory interface for determining risks (in a new product development project). Maintain a current database of risk items and organise interrogratory content based on pre-defined risk models. Determine true consequence and likelihood of risk items by modifying user input to questionnaires through an internal weighing scheme and consideration inter-relations. Inherit risk quantities from previous entities in the risk model. Highlight risk items after analysis through decision support modules. 2 Copyright 2005

3 Provide facilities to describe risk items in detail and tag mitigation actions. Provide facilities for enabling selection of mitigation options through analysis tools and a repository of lessons learnt, case studeis and industry best practices. Generate an action plan which is a list of all risk items that require mitigation and have resources allocated. The context for risk management was developed mainly through case studies in design projects implemented in a local organisation, in addition to an extensive literature review. The organisational and project environments were viewed through processes, procedures, design requirements and standard practices within the organisation. The nature of the project environment was found to be dynamic in nature due to the new product development activity as well as due different client organisations in any given project (Ahmed, et.al., 2003). Figure 2 presents the framework developed for the Intelligent Risk Mapping and Assessment System (IRMAS TM ) based on AS/NZS To maintain a universal applicability for the risk management context and to facilitate elicitation of risks, a questionnaire-based approach was adopted. The primary aim of such an elicitation process is to define particular risks in detail through identification of risk areas within project management. The input from questionnaires is tagged to additional information features such as technical, financial, schedule, organisational, etc. aspects of the project environment to provide relevance for risk assessment. A risk query mechanism was then formulated through causal diagram representation of risk items and imposed on a phase based process model to collate risk interactions and evaluate quantitative risk data and imposition of qualitative criteria on data through analysis techniques. The risk evaluation consists of decision support systems using the Analytical Hierarchy Process (AHP) and Bayesian Belief Networks (BBN) to utilize previous knowledge to evaluate the real consequence and likelihood of risk items respectively. Risks worth investigation are highlighted through analysis due to their high chance of occurring or high potential impacts, based on previous knowledge incorporated into the decision support modules. This analysis then provides a possibility for being pursued further in detailing risk items in detail, leading to the risk mitigation function. 3. The AHP Methodology The AHP concept stems from the following three principals for explicit logical analysis (Saaty, 200): Hierarchy representation and decomposition: Breaking down the problem into separate elements; Priority discrimination and synthesis: Ranking the elements by relative importance; and Logical consistency: Ensuring that elements are grouped logically and ranked consistently according to a logical criterion. The first principle of AHP concept involves construction of a functional hierarchy to decompose complex systems into their constituent parts according to their essential relationships. The elements in the hierarchy compose of clusters of system objectives, decision criteria, the attributes of criteria and alternative solutions. Each set of elements in a functional hierarchy occupies a level of the hierarchy. The top level of the hierarchy is the focus, consists of only one element i.e., the broad, overall system objective. Subsequent levels may each have several elements and because the elements in one level are to be compared 3 Copyright 2005

4 with one another against a criterion in the next higher level, the elements in each level must be of the same order of magnitude. Thus, when the elements of a level cannot be readily compared, a new level with finer distinction must be created. The second level of the hierarchy usually hosts the decision criteria, which are linked to their attributes in Level three of the hierarchy (Saaty, 200). To further examine the decision attributes, various levels of sub-attributes need to be inserted in the hierarchy, thus expending the level of hierarchy. Forming the last level of the hierarchy are the alternative solutions. The alternative solutions are linked to the decision attributes, based on which the alternative will be judged (Russell and Taylor III, 2000). A typical functional hierarchy used in AHP concept is presented in Figure3. Context Establishment Risk Model & Query Mechanism Interactive & Collaborative Interface Risk Identification Risk Analysis Risk Evaluation Prior Risk Knowledge (Repository) Qualitative & Quantitative Measures Decision Support Systems Risk Focussed Project Team Treat Risks Risk Mitigation Planning Figure 2. The framework for risk management developed for IRMAS TM based on the risk management standard AS/NZS 4360: 999 Having constructed the system hierarchy, the AHP concepts are used to analyse the priorities of elements in the hierarchy in terms of their contribution to the focus of the hierarchy (system objective). The element priority analysis begins by making pair wise comparison that is to compare the elements in pairs against a given criterion in a matrix format. The pair wise comparison process starts at the top of the hierarchy (system objective) that will be used for making the first comparison. Then from the level immediately below, take the elements to be compared (criteria to criteria i ). To populate pair wise comparison matrix, the process of judgment of the relative importance (RI) of one element over another 4 Copyright 2005

5 with respect to the property is utilized. The judgments are presented on a - 9 scale as follows (Saaty, 200): (a) Equally important ; (b) Moderately more important 3; (c) Essentially more important 5; (d) Strongly more important 7; (e) Extremely more important 9; (f) Intermediate values between two adjacent judgments are 2,4,6,8. A typical pair wise comparison matrix is presented in Table. Decision Objective Criteria Criteria 2 Criteria Criteria J Attributes Interdependency Attribute Attribute 2 Attribute Attribute J Alternative fulfillment Alternative Alternative 2 Alternative Alternative i Figure 3. The AHP functional hierarchy With the pair wise comparison matrix established, the process of elements priority analysis proceeds to integrate the pair wise comparison judgments, to determine the overall estimate of relative priorities with respect to system objective. The integration process involves the evaluation of the Vector of Priorities (VP) that designate the relative ranking of the dependent decision attributes for the objective in consideration. To translate the pair wise comparison matrix into VP of attributes, the following steps are prescribed:. Raise the pair-wise comparison matrix to powers that are successively squared each time; The rows sums are then calculated and normalized; Table. Pair wise comparison of Decision Criteria (Where RI is relative importance). Objective Criteria Criteria 2 Criteria 3 Criteria i Criteria RI 2 RI 3 RI i Criteria 2 / RI 2 RI 23 RI 2i Criteria 3 /RI 3 /RI 23 RI 3i Criteria i /RI i /RI 2i /RI 3i The steps described above are repeated until the differences between these sums in two consecutive calculations is smaller than Copyright 2005

6 The results of all the levels of the hierarchy are combined to obtain the Overall Vector of Priority (OVP). For illustration, the computation process of OVP is presented in Table 2. AVP in Eq. is the attribute s vector of priorities with respect to particular criteria, AOVP in Wq.2 is the attribute s overall vector of priorities and VP is the vector of priority. Table 2.Overall Vector of Priority computation process Overall Criteria Criteria 2 Criteria 3 Criteria i Vector of Priorities Attribute - AVP 2 AVP 3 AVP i AOVP Attribute 2 AVP 2 - VP 23 AVP 2i AOVP 2 Attribute 3 AVP 3 AVP 32 - AVP 3i AOVP 3 Attribute i AVP i AVP i2 AVP i3 - AOVP i Where, AVP = AttributeVP CriteriaVP () ij i j AOVP i = AVP in i n= (2) The element prioritisation procedure is repeated for the decision alternatives identified (Figure 3), to evaluate the OVP of decision alternatives that meets the decision attributes for the slated objective. If the alternatives do not depend on how many and what kind of other alternatives there are, the vector of priorities of the alternatives need to be set in the ideal mode, by dividing the intensity weight with the largest intensity s for each alternative. The intensity s weight is calculated by multiplying the vector of priorities of the intensity with the overall vector of priorities of the corresponding risk item. 3. Appication of AHP in risk analysis The requirement for the AHP based decision support module arose in IRMAS TM due to the need to determine the true consequence of a risk item from user input in the questionnaire based expert interview facility. This meant that the user input for consequence of a risk item needed adjustment based on an internal weighing scale taking into account all previous experiences and best practices. The pairwise comparison scheme in AHP is ideally suited to work out the relative importance of a risk item and providing an account for multiple criteria in evaluating important consequences. AHP takes into account the perceived importance of multiple criteria as pairwise comparisons by domain experts on a scale of to 9 and then mathematically determines the stable points in the domain that can justify the perception. In engineering applications AHP is most commonly used in analysing feasible design options during the conceptual product development process when several design options need to be considered on a rational basis. 6 Copyright 2005

7 4. The BBN Methodology The Bayesian theorem is founded on subjective interpretation, where a probability A) is understood as a measure of the decision maker s lack of knowledge or uncertainty about the occourrance or non occourrance of an event A. This notion of probability is therefore a personal belief and reflects the degree of belief a person has at a particular point of time. Hence, unlike the relative frequency interpretation (i.e. frequentist and Fisherian), Bayesian theorem does not prescribe a general set of procedures by which to determine the number A). This is because Bayesian theorem interpretation of probability is derived from a set of knowledge on the cause of event A. Having derived the probability from knowledge or degree of belief, Bayesian theorem allows A) to be computed using incomplete information (i.e. uncertanities), which is apparent in most decision making problems (Das, 999). Bayesian theorem stems from conditional probability theory, where the basic expression of an event A given event B is presented in the form, A, B) P ( A B) = B) (3) When the joint probability of A,B) is considered, then from the cumulative property of logic, it follows that the following two propositions are the same: (A,B) = A and B are both true (B,A) = B and A are both true Thus, they must have a truth value and same probability not matter what the state of knowledge is. Hence A,B) = B,A). Applying this relationship to the conditional probabilities results in the Bayes formula, Posteriorα Likelihood Prior or A B) B) B A) = A) (4) Where, B) is the initial belief that event B will occur, also called the prior probability. A B) is the belief that some event A will be found once the event B has actually occurred. A) is the belief that event A will be found to be true under general circumstances and B A) is the belief that event B will occur after some evidence of event A is known to support or deny event B (posterior probability). Consider a simple BBN network as represented in Figure 4, the network structure provides the conditional probabilities Y X), E Y) and F Y). The propagation of evidence can be analysed in two modes, i.e. propagaion along the links and propagation against the links. In progatation along the links mode, if evidence arrives such that X has assumed the value x, the probability distribution over the states of Y are given by Y x ), which can directly be calculated from the conditional probabilities. Similarly, E x ) is calculated by the network conditional probabilities using the following mathematical expression, P ( E x) = E Y ) Y x) y (5) Thus, in propation alon the links, when the prior distribution is fixed over the node X, depending upon the prior knowledge, this distribution propogates along the links to fix the prior probability distribution over all other nodes. 7 Copyright 2005

8 Figure 4. Representation of a simple BBN. Alternatively, in propagation against the link, if evidence arrives such that E has assumed a value e and F has assumed a value of f, then these evidences update the probability distribution over the states of X according to the dictates of the Bayesian theorem as presened below, X e, f ) = y yx f Y ) e Y ) Y X ) X ) f Y ) e Y ) Y X ) X ) In Eq. 6, the probability X e,f ) is the posterior probability and X) is the prior probability. Thus, in propagation against the links, BBN are constructed such that the root nodes (such as X in Figure 4) represent variables that are not directly observable. When observable evidence arrives, these are channelled through the intermediate nodes to the root nodes. Probability distribution is then updated through the dictates of the Bayes theorem. (6) 4.2 Application of Bayesian belief networks in risk analysis The requirement for the BBN based decision support module arose in IRMAS TM for the need to determine the true likelihood of a risk item from user input into the questionnaire and adjust the likelihood based on other connected risk events and prior probabilities of these events. BBN theory by its characteristics was found to be well suited for dealing with relationships between risk items that are not explicit and uncertainities exist in relationships because they are not definite. Typically all available information, like observation of symptoms are inputted into the BBN and then it is interrogated to find the cumulative effects of the observations and/or other uncertain ententies in the system that have no logical basis for measurement. BBN provide a methodology for uncertainty analysis where probabilistic models represent provide a simplistic expression of the real world problem or where the human intuitive approach is too broad to be feasible as a framework for decision analysis. BBN is a confluence of the two approaches, where the Bayes s theorem provides an adjustment for our belief in a prior probability and a belief probability is determined based on observations made to the Bayesian network model. Bayesian belief networks are widely applied in uncertainty analysis where Monte Carlo simulation techniques and other statistical methods are either not applicable or are too cumbersome to represent as models. 5. The AHP and BBN decision support modules For the facilitation of risk analysis, eight categories of risks were defined in IRMAS TM, also called risk factors and represent broad areas of risk in a particular phase of a new product development project. Risk items were then defined within each risk factor, narrowing down the scope of risk events. Interactive relationships were then expressed between risk items 8 Copyright 2005

9 through causal diagrams. This also facilitate the design of questionnaires, ensuring that the general risk information gathered is sufficient for the purpose and not repetitive in nature. Once the risk quantities are inputted by the user, the challenge then is to modify these inputs are biased towards risk items that need a higher priority as determined by the use of the concurrent engineering design philosophy, prior organisational experiences, best practices and company standards. This in turn, lead to highlighting of high risk items and make up the first pass of risk analysis in a particular phase. Detailed risk analysis follows where trivial risk items are demoted in the order of priorities and the important ones are detailed for mitigation actions. The AHP and BBN decision support modules facilitate risk analysis leading to a risk items list. 5. Application of AHP in IRMAS TM Definition of risk items in particular phases based on the concurrent engineering design process, the specific domain of application to a local organisation and the clumping of risk items under risk factors meant that a two level hiererchy is appropriate to accommodate the AHP analysis technique in IRMAS TM. The determination of relative importance of risk items according to their consequence with respect to other risk items under the same risk factor is a reasonable construct to rank risk consequences in the second level of analysis. The first level of hierarchy is that of the risk factors themselves, which vary from project phase to project phase. For example, in the detailed design phase technical risks, schedule risks and network risks dominate, because this phase determines the number of design iterations that are sufficient to satisfy design specifications. Ideally, a sound understanding of the design specifications is promoted through networking amongst the multi-functional design team members and the detailed design task schedule is maintained. Common understanding of technical specifications and ample team interaction ensures that desing iterations minimal. Similarly, the same logic can be applied to the testing phase where all risks are usually significantly low, unless unqualified materials have been used, testing facilities are not available or the product was under designed. Hence, this phase represents limited technical, financial and resource risks. The pariwise comparison in AHP, then elucidates how much more important one risk factor is in comparison to the others in a particular phase. 5.2 Application of BBN in IRMAS TM The physical form of the Bayenesian belief networks is the same as the causal diagram for that phase with the addition of entities for user input in a backward chaining mechanism. Some risk events are inputs to risk factors while others are outputs from that phase. Entities that inherit risk from previous phases are also added. These relationships are defined in BBN and also their prior probabilities are are attached. The prior probabilites for relationships are not always explicit and usually is the expert knowledge that humans use intuitively for making decisions. On the whole, the cumulative effects of relationships among risk events are very complex and not possible for the human mind to comprehend the flow-on effects of risk events due to likelihood of occourrance on one another. BBN also allows definition of speculative relationships between risk events in the form of probabilities of a risk item due to its relationship with one or more risk items. The Bayes theorem then determines posterior probabilities based on observations that are made to the network such that flow-on effects are taken into account. 9 Copyright 2005

10 6. Conclusion This paper presents conceptualisation of risk analysis decision support modules in Intelligent Risk Mapping and Assessment System (IRMAS TM ). The techniques of Analytical Hierarch Process and Bayesian Belief Networks were used in a novel way to account for prior organisational knowledge in comparison to other knowledge based techniques such as expert systems and statistical analysis tools. The applications described in this paper are at a confluence of rule based systems and numerical techniques. The methodologies found in Commercial Off The Shelf (COTS) software for risk identification and analysis typically fell into the groups of interrogative or Monte Carlo Analysis. Interrogative tools deduced risks by finding whether a benchmarked practice is being followed and then analyse its magnitude as a score, while Monte Carlo based COTS tools provided graphical tools for modelling statistical distributions of numerical data pertaining to a risk event. In contrast to these techniques in IRMAS TM, the interrogative approach was adopted for risk analysis through a unique application of AHP and BBN techniques to account for consequence of risk items based on prior knowledge and accounting for influence on each other for determining likelihood of risk events. Acknowledgements The authors wish to thank the Cooporative Research Centre for Intelligent Manufacturing Systems and Technologies (CRCIMST) for providing support for the development of IRMAS TM under Sub-Program 4.2. References AS/NZS 4360 (999), Risk Management Standard, Standards Association of Australia: Sydney, NSW. Ahmed A., Kayis B, Zhou M., Khoo Y.B. and Kusumo, R. (2003), A Risk Management Approach for Concurrent Product/Process Design and Development, Proccedings of International Business Information Management Conference, December 6-8, 2003, Cairo, Egypt, p Ahmed A., Amornsawadwatana, S. and Kayis B. (2003) A Conceptual Framework for Risk Analysis in Concurrent Engineering, Proceedings of the 7th International Conference on Production Research Blacksburg, Virginia (R.6 Paper No. 86). Das B. (999), Representing Uncertainty Using Bayesian Networks, Publication DSTO-TR- 098, Department of Defense, Defence Science and Technology Organisation, Salisbury, Australia. Russell R.S. and Taylor III B.W. (2000), Operations Management, Upper Saddle River, NJ: Prentice Hall Inc, pp Saaty T.L. (200), Decision Making for Leaders The Analytic Hierarchy Process for Decisions in a Complex World, 3 rd Edition, RWS Publications, USA, Copyright 2005

Outline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper?

Outline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper? Outline A Critique of Software Defect Prediction Models Norman E. Fenton Dongfeng Zhu What s inside this paper? What kind of new technique was developed in this paper? Research area of this technique?

More information

Handling Partial Preferences in the Belief AHP Method: Application to Life Cycle Assessment

Handling Partial Preferences in the Belief AHP Method: Application to Life Cycle Assessment Handling Partial Preferences in the Belief AHP Method: Application to Life Cycle Assessment Amel Ennaceur 1, Zied Elouedi 1, and Eric Lefevre 2 1 University of Tunis, Institut Supérieur de Gestion de Tunis,

More information

[1] provides a philosophical introduction to the subject. Simon [21] discusses numerous topics in economics; see [2] for a broad economic survey.

[1] provides a philosophical introduction to the subject. Simon [21] discusses numerous topics in economics; see [2] for a broad economic survey. Draft of an article to appear in The MIT Encyclopedia of the Cognitive Sciences (Rob Wilson and Frank Kiel, editors), Cambridge, Massachusetts: MIT Press, 1997. Copyright c 1997 Jon Doyle. All rights reserved

More information

Bayesian Belief Network Based Fault Diagnosis in Automotive Electronic Systems

Bayesian Belief Network Based Fault Diagnosis in Automotive Electronic Systems Bayesian Belief Network Based Fault Diagnosis in Automotive Electronic Systems Yingping Huang *, David Antory, R. Peter Jones, Craig Groom, Ross McMurran, Peter Earp and Francis Mckinney International

More information

AN ANALYTIC HIERARCHY PROCESS (AHP) APPROACH.

AN ANALYTIC HIERARCHY PROCESS (AHP) APPROACH. HOW DIFFERENT ARE THE PERCEPTIONS OVER THE MAIN MOTIVATIONAL TOOLS IN MILITARY? AN ANALYTIC HIERARCHY PROCESS (AHP) APPROACH. Paul-Mugurel POLEANSCHI Commander (Navy), Romanian Naval Forces Staff, Bucharest,

More information

Application of Bayesian Networks to Quantitative Assessment of Safety Barriers Performance in the Prevention of Major Accidents

Application of Bayesian Networks to Quantitative Assessment of Safety Barriers Performance in the Prevention of Major Accidents 151 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 53, 2016 Guest Editors: Valerio Cozzani, Eddy De Rademaeker, Davide Manca Copyright 2016, AIDIC Servizi S.r.l., ISBN 978-88-95608-44-0; ISSN

More information

Dementia Priority Setting Partnership. PROTOCOL March 2012

Dementia Priority Setting Partnership. PROTOCOL March 2012 Dementia Priority Setting Partnership PROTOCOL March 2012 Purpose The purpose of this protocol is to set out the aims, objectives and commitments of the Dementia Priority Setting Partnership (PSP) and

More information

Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL SAL. Lee W. Wagenhals Alexander H. Levis

Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL SAL. Lee W. Wagenhals Alexander H. Levis Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL Lee W. Wagenhals Alexander H. Levis ,@gmu.edu Adversary Behavioral Modeling Maxwell AFB, Montgomery AL March 8-9, 2007 1 Outline Pythia

More information

CHAPTER VI RESEARCH METHODOLOGY

CHAPTER VI RESEARCH METHODOLOGY CHAPTER VI RESEARCH METHODOLOGY 6.1 Research Design Research is an organized, systematic, data based, critical, objective, scientific inquiry or investigation into a specific problem, undertaken with the

More information

Thinking Like a Researcher

Thinking Like a Researcher 3-1 Thinking Like a Researcher 3-3 Learning Objectives Understand... The terminology used by professional researchers employing scientific thinking. What you need to formulate a solid research hypothesis.

More information

CHAPTER 3 METHOD AND PROCEDURE

CHAPTER 3 METHOD AND PROCEDURE CHAPTER 3 METHOD AND PROCEDURE Previous chapter namely Review of the Literature was concerned with the review of the research studies conducted in the field of teacher education, with special reference

More information

Fundamental Concepts for Using Diagnostic Classification Models. Section #2 NCME 2016 Training Session. NCME 2016 Training Session: Section 2

Fundamental Concepts for Using Diagnostic Classification Models. Section #2 NCME 2016 Training Session. NCME 2016 Training Session: Section 2 Fundamental Concepts for Using Diagnostic Classification Models Section #2 NCME 2016 Training Session NCME 2016 Training Session: Section 2 Lecture Overview Nature of attributes What s in a name? Grain

More information

A Study of Methodology on Effective Feasibility Analysis Using Fuzzy & the Bayesian Network

A Study of Methodology on Effective Feasibility Analysis Using Fuzzy & the Bayesian Network , pp.116-120 http://dx.doi.org/10.14257/astl.2016.137.22 A Study of Methodology on Effective Feasibility Analysis Using Fuzzy & the Bayesian Network JaeHyuk Cho 1 1 Division of Next Growth Engine R&D Coordiantion,

More information

CHAPTER 3 RESEARCH METHODOLOGY

CHAPTER 3 RESEARCH METHODOLOGY CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction 3.1 Methodology 3.1.1 Research Design 3.1. Research Framework Design 3.1.3 Research Instrument 3.1.4 Validity of Questionnaire 3.1.5 Statistical Measurement

More information

Expert judgements in risk and reliability analysis

Expert judgements in risk and reliability analysis Expert judgements in risk and reliability analysis Jan-Erik Holmberg M2-E2117 Risk analysis, April 17, 2016 Aalto university Contents Definitions Applications Bayesian approach Examples 2 Background Objective,

More information

CISC453 Winter Probabilistic Reasoning Part B: AIMA3e Ch

CISC453 Winter Probabilistic Reasoning Part B: AIMA3e Ch CISC453 Winter 2010 Probabilistic Reasoning Part B: AIMA3e Ch 14.5-14.8 Overview 2 a roundup of approaches from AIMA3e 14.5-14.8 14.5 a survey of approximate methods alternatives to the direct computing

More information

On Eliciting Contribution Measures in Goal Models

On Eliciting Contribution Measures in Goal Models On Eliciting Contribution Measures in Goal Models Sotirios Liaskos School of Information Technology York University Toronto, ON, Canada liaskos@yorku.ca Rina Jalman School of Information Technology York

More information

Chapter-2 RESEARCH DESIGN

Chapter-2 RESEARCH DESIGN Chapter-2 RESEARCH DESIGN 33 2.1 Introduction to Research Methodology: The general meaning of research is the search for knowledge. Research is also defined as a careful investigation or inquiry, especially

More information

ERA: Architectures for Inference

ERA: Architectures for Inference ERA: Architectures for Inference Dan Hammerstrom Electrical And Computer Engineering 7/28/09 1 Intelligent Computing In spite of the transistor bounty of Moore s law, there is a large class of problems

More information

How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis?

How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis? How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis? Richards J. Heuer, Jr. Version 1.2, October 16, 2005 This document is from a collection of works by Richards J. Heuer, Jr.

More information

POSTGRADUATE RESEARCH EXPERIENCE A Report of the Postgraduate Research Experience Questionnaire

POSTGRADUATE RESEARCH EXPERIENCE A Report of the Postgraduate Research Experience Questionnaire POSTGRADUATE RESEARCH EXPERIENCE 2011 A Report of the Postgraduate Research Experience Questionnaire Postgraduate Research Experience 2011 A REPORT OF THE POSTGRADUATE RESEARCH EXPERIENCE QUESTIONNAIRE

More information

Knowledge Based Systems

Knowledge Based Systems Knowledge Based Systems Human Expert A human expert is a specialist for a specific differentiated application field who creates solutions to customer problems in this respective field and supports them

More information

A Brief Introduction to Bayesian Statistics

A Brief Introduction to Bayesian Statistics A Brief Introduction to Statistics David Kaplan Department of Educational Psychology Methods for Social Policy Research and, Washington, DC 2017 1 / 37 The Reverend Thomas Bayes, 1701 1761 2 / 37 Pierre-Simon

More information

REPORT ON EMOTIONAL INTELLIGENCE QUESTIONNAIRE: GENERAL

REPORT ON EMOTIONAL INTELLIGENCE QUESTIONNAIRE: GENERAL REPORT ON EMOTIONAL INTELLIGENCE QUESTIONNAIRE: GENERAL Name: Email: Date: Sample Person sample@email.com IMPORTANT NOTE The descriptions of emotional intelligence the report contains are not absolute

More information

CONSTRUCTING A PROGRAM LOGIC MODEL

CONSTRUCTING A PROGRAM LOGIC MODEL CONSTRUCTING A PROGRAM LOGIC MODEL Summary The Constructing a Program Logic Model Tool provides a set of questions which program coordinators may use as a basic survey to obtain information needed to construct

More information

Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework

Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework Thomas E. Rothenfluh 1, Karl Bögl 2, and Klaus-Peter Adlassnig 2 1 Department of Psychology University of Zurich, Zürichbergstraße

More information

CLARIFYING THE CURRENT AND FUTURE SITUATION IN RESPECT OF

CLARIFYING THE CURRENT AND FUTURE SITUATION IN RESPECT OF CLARIFYING THE CURRENT AND FUTURE SITUATION IN RESPECT OF CALL RECEIPT AND DISPATCH (CRD), COMMAND, CONTROL, COORDINATION & INFORMATION FLOW (C 3 I) FOR CFS OPERATIONAL ACTIVITIES INTRODUCTION Recently

More information

Probability-Utility Model for Managing Evidence-based Central Database

Probability-Utility Model for Managing Evidence-based Central Database The Open Dentistry Journal, 2010, 4, 61-66 61 Open Access Probability-Utility Model for Managing Evidence-based Central Database Janet G. Bauer* UCLA School of Dentistry, Division of Restorative Dentistry,

More information

Support system for breast cancer treatment

Support system for breast cancer treatment Support system for breast cancer treatment SNEZANA ADZEMOVIC Civil Hospital of Cacak, Cara Lazara bb, 32000 Cacak, SERBIA Abstract:-The aim of this paper is to seek out optimal relation between diagnostic

More information

Postgraduate Research Experience 2012 A report on the experience of recent higher degree research graduates

Postgraduate Research Experience 2012 A report on the experience of recent higher degree research graduates Postgraduate Research Experience 2012 A report on the experience of recent higher degree research graduates Postgraduate Research Experience 2012 a report on the experience of recent higher degree research

More information

MEASURING AFFECTIVE RESPONSES TO CONFECTIONARIES USING PAIRED COMPARISONS

MEASURING AFFECTIVE RESPONSES TO CONFECTIONARIES USING PAIRED COMPARISONS MEASURING AFFECTIVE RESPONSES TO CONFECTIONARIES USING PAIRED COMPARISONS Farzilnizam AHMAD a, Raymond HOLT a and Brian HENSON a a Institute Design, Robotic & Optimizations (IDRO), School of Mechanical

More information

Advances in Environmental Biology

Advances in Environmental Biology AENSI Journals Advances in Environmental Biology ISSN-1995-0756 EISSN-1998-1066 Journal home page: http://www.aensiweb.com/aeb/ Weighting the Behavioral Biases of Investors in Shiraz Stock Exchange by

More information

ISPOR Task Force Report: ITC & NMA Study Questionnaire

ISPOR Task Force Report: ITC & NMA Study Questionnaire INDIRECT TREATMENT COMPARISON / NETWORK META-ANALYSIS STUDY QUESTIONNAIRE TO ASSESS RELEVANCE AND CREDIBILITY TO INFORM HEALTHCARE DECISION-MAKING: AN ISPOR-AMCP-NPC GOOD PRACTICE TASK FORCE REPORT DRAFT

More information

Assurance Engagements Other than Audits or Review of Historical Financial Statements

Assurance Engagements Other than Audits or Review of Historical Financial Statements Issued December 2007 International Standard on Assurance Engagements Assurance Engagements Other than Audits or Review of Historical Financial Statements The Malaysian Institute Of Certified Public Accountants

More information

Application of Bayesian Network Model for Enterprise Risk Management of Expressway Management Corporation

Application of Bayesian Network Model for Enterprise Risk Management of Expressway Management Corporation 2011 International Conference on Innovation, Management and Service IPEDR vol.14(2011) (2011) IACSIT Press, Singapore Application of Bayesian Network Model for Enterprise Risk Management of Expressway

More information

Kevin Burns. Introduction. Foundation

Kevin Burns. Introduction. Foundation From: AAAI Technical Report FS-02-01. Compilation copyright 2002, AAAI (www.aaai.org). All rights reserved. Dealing with TRACS: The Game of Confidence and Consequence Kevin Burns The MITRE Corporation

More information

Decisions and Dependence in Influence Diagrams

Decisions and Dependence in Influence Diagrams JMLR: Workshop and Conference Proceedings vol 52, 462-473, 2016 PGM 2016 Decisions and Dependence in Influence Diagrams Ross D. hachter Department of Management cience and Engineering tanford University

More information

International Journal of Software and Web Sciences (IJSWS)

International Journal of Software and Web Sciences (IJSWS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Improving Construction of Conditional Probability Tables for Ranked Nodes in Bayesian Networks Pekka Laitila, Kai Virtanen

Improving Construction of Conditional Probability Tables for Ranked Nodes in Bayesian Networks Pekka Laitila, Kai Virtanen Improving Construction of Conditional Probability Tables for Ranked Nodes in Bayesian Networks Pekka Laitila, Kai Virtanen pekka.laitila@aalto.fi, kai.virtanen@aalto.fi Systems Analysis Laboratory, Department

More information

Technical Specifications

Technical Specifications Technical Specifications In order to provide summary information across a set of exercises, all tests must employ some form of scoring models. The most familiar of these scoring models is the one typically

More information

Inferencing in Artificial Intelligence and Computational Linguistics

Inferencing in Artificial Intelligence and Computational Linguistics Inferencing in Artificial Intelligence and Computational Linguistics (http://www.dfki.de/~horacek/infer-ai-cl.html) no classes on 28.5., 18.6., 25.6. 2-3 extra lectures will be scheduled Helmut Horacek

More information

Cancer Control Council Evaluation and Monitoring Framework

Cancer Control Council Evaluation and Monitoring Framework Cancer Control Council Evaluation and Monitoring Framework Table of contents 1. Purpose...1 2. Background...1 3. Clarification of key tasks...2 4. International evaluation and monitoring frameworks...3

More information

A Multi-Criteria Decision Making Model for Treatment of Helicobacter pylori Infection in Children

A Multi-Criteria Decision Making Model for Treatment of Helicobacter pylori Infection in Children HK J Paediatr (new series) 2012;17:237-242 A Multi-Criteria Decision Making Model for Treatment of Helicobacter pylori Infection in Children A ERJAEE, M BAGHERPOUR, S RAZEGHI, SM DEHGHANI, MH IMANIEH,

More information

Causal Knowledge Modeling for Traditional Chinese Medicine using OWL 2

Causal Knowledge Modeling for Traditional Chinese Medicine using OWL 2 Causal Knowledge Modeling for Traditional Chinese Medicine using OWL 2 Peiqin Gu College of Computer Science, Zhejiang University, P.R.China gupeiqin@zju.edu.cn Abstract. Unlike Western Medicine, those

More information

Bayes Theorem Application: Estimating Outcomes in Terms of Probability

Bayes Theorem Application: Estimating Outcomes in Terms of Probability Bayes Theorem Application: Estimating Outcomes in Terms of Probability The better the estimates, the better the outcomes. It s true in engineering and in just about everything else. Decisions and judgments

More information

A Comparison of Collaborative Filtering Methods for Medication Reconciliation

A Comparison of Collaborative Filtering Methods for Medication Reconciliation A Comparison of Collaborative Filtering Methods for Medication Reconciliation Huanian Zheng, Rema Padman, Daniel B. Neill The H. John Heinz III College, Carnegie Mellon University, Pittsburgh, PA, 15213,

More information

MS Priority Setting Partnership. PROTOCOL August 2012

MS Priority Setting Partnership. PROTOCOL August 2012 MS Priority Setting Partnership PROTOCOL August 2012 Purpose The purpose of this protocol is to set out the aims, objectives and commitments of the MS Priority Setting Partnership (PSP) and the basic roles

More information

Alternative Threat Methodology

Alternative Threat Methodology Volume 4 Number 1 Volume 4, No. 1: Spring 2011 Article 5 Alternative Threat Methodology Charles B. King III Transportation Security Administration, chas.king@dhs.gov Follow this and additional works at:

More information

Strategic Planning for HIV/AIDS

Strategic Planning for HIV/AIDS ASAP Regional Training on Epidemiological and Economic Tools for HIV/AIDS Strategic Planning S P Strategic Planning for HIV/AIDS M1S2 Module 1, Session 2 Results-based Strategic Planning S P The Strategy

More information

Minimizing Uncertainty in Property Casualty Loss Reserve Estimates Chris G. Gross, ACAS, MAAA

Minimizing Uncertainty in Property Casualty Loss Reserve Estimates Chris G. Gross, ACAS, MAAA Minimizing Uncertainty in Property Casualty Loss Reserve Estimates Chris G. Gross, ACAS, MAAA The uncertain nature of property casualty loss reserves Property Casualty loss reserves are inherently uncertain.

More information

Models of Information Retrieval

Models of Information Retrieval Models of Information Retrieval Introduction By information behaviour is meant those activities a person may engage in when identifying their own needs for information, searching for such information in

More information

in Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Swiss Federal Institute of Technology

in Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Swiss Federal Institute of Technology Risk and Safety in Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Contents of Today's Lecture Introduction to Bayesian Probabilistic Nets (BPN) Causality as a support in reasoning Basic

More information

Common Criteria. for. CGIAR Research Proposal (CRP) Design and Assessment

Common Criteria. for. CGIAR Research Proposal (CRP) Design and Assessment Common Criteria for CGIAR Research Proposal (CRP) Design and Assessment 30 August 2010 1 CGIAR Research Proposals (CRPs) are reviewed at various stages of their development and approval. These assessments

More information

Perception Lie Paradox: Mathematically Proved Uncertainty about Humans Perception Similarity

Perception Lie Paradox: Mathematically Proved Uncertainty about Humans Perception Similarity Perception Lie Paradox: Mathematically Proved Uncertainty about Humans Perception Similarity Ahmed M. Mahran Computer and Systems Engineering Department, Faculty of Engineering, Alexandria University,

More information

The Development and Application of Bayesian Networks Used in Data Mining Under Big Data

The Development and Application of Bayesian Networks Used in Data Mining Under Big Data 2017 International Conference on Arts and Design, Education and Social Sciences (ADESS 2017) ISBN: 978-1-60595-511-7 The Development and Application of Bayesian Networks Used in Data Mining Under Big Data

More information

A to Z OF RESEARCH METHODS AND TERMS APPLICABLE WITHIN SOCIAL SCIENCE RESEARCH

A to Z OF RESEARCH METHODS AND TERMS APPLICABLE WITHIN SOCIAL SCIENCE RESEARCH A to Z OF RESEARCH METHODS AND TERMS APPLICABLE WITHIN SOCIAL SCIENCE RESEARCH QUANTATIVE RESEARCH METHODS Are concerned with trying to quantify things; they ask questions such as how long, how many or

More information

Lecture 3: Bayesian Networks 1

Lecture 3: Bayesian Networks 1 Lecture 3: Bayesian Networks 1 Jingpeng Li 1 Content Reminder from previous lecture: Bayes theorem Bayesian networks Why are they currently interesting? Detailed example from medical diagnostics Bayesian

More information

Supplementary notes for lecture 8: Computational modeling of cognitive development

Supplementary notes for lecture 8: Computational modeling of cognitive development Supplementary notes for lecture 8: Computational modeling of cognitive development Slide 1 Why computational modeling is important for studying cognitive development. Let s think about how to study the

More information

Model calibration and Bayesian methods for probabilistic projections

Model calibration and Bayesian methods for probabilistic projections ETH Zurich Reto Knutti Model calibration and Bayesian methods for probabilistic projections Reto Knutti, IAC ETH Toy model Model: obs = linear trend + noise(variance, spectrum) 1) Short term predictability,

More information

The use of Interpretive Narratives in the analysis of Project Failures. (Lynette Drevin)

The use of Interpretive Narratives in the analysis of Project Failures. (Lynette Drevin) Information Systems Research Methodology: From Paradigm to Practice (Roelien Goede) The use of Interpretive Narratives in the analysis of Project Failures. (Lynette Drevin) Measuring Information Security

More information

Representation and Analysis of Medical Decision Problems with Influence. Diagrams

Representation and Analysis of Medical Decision Problems with Influence. Diagrams Representation and Analysis of Medical Decision Problems with Influence Diagrams Douglas K. Owens, M.D., M.Sc., VA Palo Alto Health Care System, Palo Alto, California, Section on Medical Informatics, Department

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1 Motivation and Goals The increasing availability and decreasing cost of high-throughput (HT) technologies coupled with the availability of computational tools and data form a

More information

Analysis of Competing Hypotheses using Subjective Logic (ACH-SL)

Analysis of Competing Hypotheses using Subjective Logic (ACH-SL) Analysis of Competing Hypotheses using Subjective Logic (ACH-SL) Simon Pope and Audun Jøsang, DSTC, CRC for Enterprise Distributed Systems Technology ICCRTS, 13-16 June 2005 June 22, 2005 DSTC 2005. All

More information

How to Escape the Statistical Purgatory of Stress Testing. Riccardo Rebonato Oxford, PIMCO

How to Escape the Statistical Purgatory of Stress Testing. Riccardo Rebonato Oxford, PIMCO How to Escape the Statistical Purgatory of Stress Testing Riccardo Rebonato Oxford, PIMCO Berkowitz statistical purgatory Stress testing is about imperfect predictability. When it comes to imperfect predictability,

More information

ScienceDirect. A Multi-Criteria Decision Framework to Measure Spiritual Intelligence of University Teachers

ScienceDirect. A Multi-Criteria Decision Framework to Measure Spiritual Intelligence of University Teachers Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 91 (2016 ) 591 598 Information Technology and Quantitative Management (ITQM 2016) A Multi-Criteria Decision Framework to

More information

Bayesian Estimation of a Meta-analysis model using Gibbs sampler

Bayesian Estimation of a Meta-analysis model using Gibbs sampler University of Wollongong Research Online Applied Statistics Education and Research Collaboration (ASEARC) - Conference Papers Faculty of Engineering and Information Sciences 2012 Bayesian Estimation of

More information

Sense-making Approach in Determining Health Situation, Information Seeking and Usage

Sense-making Approach in Determining Health Situation, Information Seeking and Usage DOI: 10.7763/IPEDR. 2013. V62. 16 Sense-making Approach in Determining Health Situation, Information Seeking and Usage Ismail Sualman 1 and Rosni Jaafar 1 Faculty of Communication and Media Studies, Universiti

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal

International Journal of Engineering Research-Online A Peer Reviewed International Journal RESEARCH ARTICLE ISSN: 2321-7758 EXPERT SYSTEM USING AHP TO SUGGEST DIET TO THE DIABETICS IN ORDER TO CONTROL BLOOD SUGAR LEVEL OF THE PATIENT BARMURA YIBGETA SIFIR 1, RAHUL RAGHVENDRA JOSHI 2 1 M.Tech,

More information

Prize: an R package for prioritization estimation based on analytic hierarchy process

Prize: an R package for prioritization estimation based on analytic hierarchy process Prize: an R package for prioritization estimation based on analytic hierarchy process Daryanaz Dargahi October 30, 2017 daryanazdargahi@gmail.com Contents 1 Licensing 2 2 Overview 2 3 Relative AHP 3 3.1

More information

John Quigley, Tim Bedford, Lesley Walls Department of Management Science, University of Strathclyde, Glasgow

John Quigley, Tim Bedford, Lesley Walls Department of Management Science, University of Strathclyde, Glasgow Empirical Bayes Estimates of Development Reliability for One Shot Devices John Quigley, Tim Bedford, Lesley Walls Department of Management Science, University of Strathclyde, Glasgow This article describes

More information

Analysis of Competing Hypotheses using Subjective Logic (ACH-SL)

Analysis of Competing Hypotheses using Subjective Logic (ACH-SL) Analysis of Competing Hypotheses using Subjective Logic (ACH-SL) Simon Pope and Audun Jøsang, DSTC, CRC for Enterprise Distributed Systems Technology ICCRTS, 13-16 June 2005 June 22, 2005 DSTC 2005. All

More information

Prostate Cancer Priority Setting Partnership. PROTOCOL June 2009

Prostate Cancer Priority Setting Partnership. PROTOCOL June 2009 Prostate Cancer Priority Setting Partnership PROTOCOL June 2009 Purpose The purpose of this protocol is to set out the aims, objectives and commitments of the Prostate Cancer Priority Setting Partnership

More information

10CS664: PATTERN RECOGNITION QUESTION BANK

10CS664: PATTERN RECOGNITION QUESTION BANK 10CS664: PATTERN RECOGNITION QUESTION BANK Assignments would be handed out in class as well as posted on the class blog for the course. Please solve the problems in the exercises of the prescribed text

More information

Novel developments in the risk assessment of food allergens

Novel developments in the risk assessment of food allergens Novel developments in the risk assessment of food allergens Geert Houben* and Marty Blom TNO, PO Box 360, 3700AJ Zeist, The Netherlands; Geert.houben@tno.nl Abstract Risk assessment of food allergens has

More information

Cognitive Maps-Based Student Model

Cognitive Maps-Based Student Model Cognitive Maps-Based Student Model Alejandro Peña 1,2,3, Humberto Sossa 3, Agustín Gutiérrez 3 WOLNM 1, UPIICSA 2 & CIC 3 - National Polytechnic Institute 2,3, Mexico 31 Julio 1859, # 1099-B, Leyes Reforma,

More information

Chapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes

Chapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes Chapter 2 Knowledge Representation: Reasoning, Issues, and Acquisition Teaching Notes This chapter explains how knowledge is represented in artificial intelligence. The topic may be launched by introducing

More information

Implementation of Perception Classification based on BDI Model using Bayesian Classifier

Implementation of Perception Classification based on BDI Model using Bayesian Classifier Implementation of Perception Classification based on BDI Model using Bayesian Classifier Vishwanath Y 1 Murali T S 2 Dr M.V Vijayakumar 3 1 Research Scholar, Dept. of Computer Science & Engineering, Jain

More information

Grundlagen des Software Engineering Fundamentals of Software Engineering. Chapter 4.4: Software Application Engineering Requirements Management

Grundlagen des Software Engineering Fundamentals of Software Engineering. Chapter 4.4: Software Application Engineering Requirements Management Software Engineering Research Group: es and Measurement Fachbereich Informatik TU Kaiserslautern Grundlagen des Software Engineering Fundamentals of Software Engineering Winter Term 2011/12 Prof. Dr. Dr.

More information

Structural Modelling of Operational Risk in Financial Institutions:

Structural Modelling of Operational Risk in Financial Institutions: Structural Modelling of Operational Risk in Financial Institutions: Application of Bayesian Networks and Balanced Scorecards to IT Infrastructure Risk Modelling Inaugural-Dissertation zur Erlangung des

More information

Research Methodology in Social Sciences. by Dr. Rina Astini

Research Methodology in Social Sciences. by Dr. Rina Astini Research Methodology in Social Sciences by Dr. Rina Astini Email : rina_astini@mercubuana.ac.id What is Research? Re ---------------- Search Re means (once more, afresh, anew) or (back; with return to

More information

Phone Number:

Phone Number: International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1589 Multi-Agent based Diagnostic Model for Diabetes 1 A. A. Obiniyi and 2 M. K. Ahmed 1 Department of Mathematic,

More information

A Study of Investigating Adolescents Eating out Behavior by Using Analytic Hierarchy Process

A Study of Investigating Adolescents Eating out Behavior by Using Analytic Hierarchy Process OPEN ACCESS EURASIA Journal of Mathematics Science and Technology Education ISSN: 1305-8223 (online) 1305-8215 (print) 2017 13(7):3227-3234 DOI 10.12973/eurasia.2017.00714a A Study of Investigating Adolescents

More information

PROPOSED WORK PROGRAMME FOR THE CLEARING-HOUSE MECHANISM IN SUPPORT OF THE STRATEGIC PLAN FOR BIODIVERSITY Note by the Executive Secretary

PROPOSED WORK PROGRAMME FOR THE CLEARING-HOUSE MECHANISM IN SUPPORT OF THE STRATEGIC PLAN FOR BIODIVERSITY Note by the Executive Secretary CBD Distr. GENERAL UNEP/CBD/COP/11/31 30 July 2012 ORIGINAL: ENGLISH CONFERENCE OF THE PARTIES TO THE CONVENTION ON BIOLOGICAL DIVERSITY Eleventh meeting Hyderabad, India, 8 19 October 2012 Item 3.2 of

More information

White Paper. Human Behavior Analytics with Proxy Interrogatories

White Paper. Human Behavior Analytics with Proxy Interrogatories White Paper Human Behavior Analytics with Proxy Interrogatories Introduction Mission sets across defense, intelligence and security organizations would benefit from applying effective human behavior analytics

More information

Citation for published version (APA): Geus, A. F. D., & Rotterdam, E. P. (1992). Decision support in aneastehesia s.n.

Citation for published version (APA): Geus, A. F. D., & Rotterdam, E. P. (1992). Decision support in aneastehesia s.n. University of Groningen Decision support in aneastehesia Geus, Arian Fred de; Rotterdam, Ernest Peter IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to

More information

Evaluating the Quality of Evidence from a Network Meta- Analysis

Evaluating the Quality of Evidence from a Network Meta- Analysis Evaluating the Quality of Evidence from a Network Meta- Analysis Georgia Salanti 1, Cinzia Del Giovane 2, Anna Chaimani 1, Deborah M. Caldwell 3, Julian P. T. Higgins 3,4 * 1 Department of Hygiene and

More information

Thank you for your insightful comments and suggestions. It s really helpful to improve the manuscript.

Thank you for your insightful comments and suggestions. It s really helpful to improve the manuscript. Author s response to reviews Title: Application of the analytic hierarchy approach to the risk assessment of Zika virus disease transmission in Guangdong Province, China Authors: Xing Li (lixing.echo@foxmail.com)

More information

Assignment Question Paper I

Assignment Question Paper I Subject : - Discrete Mathematics Maximum Marks : 30 1. Define Harmonic Mean (H.M.) of two given numbers relation between A.M.,G.M. &H.M.? 2. How we can represent the set & notation, define types of sets?

More information

Unit 1 Exploring and Understanding Data

Unit 1 Exploring and Understanding Data Unit 1 Exploring and Understanding Data Area Principle Bar Chart Boxplot Conditional Distribution Dotplot Empirical Rule Five Number Summary Frequency Distribution Frequency Polygon Histogram Interquartile

More information

Effects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game

Effects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game Effects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game Ivaylo Vlaev (ivaylo.vlaev@psy.ox.ac.uk) Department of Experimental Psychology, University of Oxford, Oxford, OX1

More information

INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS 3000 ASSURANCE ENGAGEMENTS OTHER THAN AUDITS OR REVIEWS OF HISTORICAL FINANCIAL INFORMATION CONTENTS

INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS 3000 ASSURANCE ENGAGEMENTS OTHER THAN AUDITS OR REVIEWS OF HISTORICAL FINANCIAL INFORMATION CONTENTS INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS 3000 ASSURANCE ENGAGEMENTS OTHER THAN AUDITS OR REVIEWS OF HISTORICAL FINANCIAL INFORMATION (Effective for assurance reports dated on or after January 1,

More information

School of Population and Public Health SPPH 503 Epidemiologic methods II January to April 2019

School of Population and Public Health SPPH 503 Epidemiologic methods II January to April 2019 School of Population and Public Health SPPH 503 Epidemiologic methods II January to April 2019 Time: Tuesday, 1330 1630 Location: School of Population and Public Health, UBC Course description Students

More information

What are the challenges in addressing adjustments for data uncertainty?

What are the challenges in addressing adjustments for data uncertainty? What are the challenges in addressing adjustments for data uncertainty? Hildegard Przyrembel, Berlin Federal Institute for Risk Assessment (BfR), Berlin (retired) Scientific Panel for Dietetic Foods, Nutrition

More information

Pilot Study: Clinical Trial Task Ontology Development. A prototype ontology of common participant-oriented clinical research tasks and

Pilot Study: Clinical Trial Task Ontology Development. A prototype ontology of common participant-oriented clinical research tasks and Pilot Study: Clinical Trial Task Ontology Development Introduction A prototype ontology of common participant-oriented clinical research tasks and events was developed using a multi-step process as summarized

More information

Research Plan And Design

Research Plan And Design Research Plan And Design By Dr. Achmad Nizar Hidayanto Information Management Lab Faculty of Computer Science Universitas Indonesia Salemba, 1 Agustus 2017 Research - Defined The process of gathering information

More information

YSC Potential Guide Report for Joe Bloggs

YSC Potential Guide Report for Joe Bloggs YSC Potential Guide About this Report This report is based upon the YSC Potential Guide powered by Saville Consulting Wave. The questionnaire explores an individual s approach to work in a number of relevant

More information

Exploring Experiential Learning: Simulations and Experiential Exercises, Volume 5, 1978 THE USE OF PROGRAM BAYAUD IN THE TEACHING OF AUDIT SAMPLING

Exploring Experiential Learning: Simulations and Experiential Exercises, Volume 5, 1978 THE USE OF PROGRAM BAYAUD IN THE TEACHING OF AUDIT SAMPLING THE USE OF PROGRAM BAYAUD IN THE TEACHING OF AUDIT SAMPLING James W. Gentry, Kansas State University Mary H. Bonczkowski, Kansas State University Charles W. Caldwell, Kansas State University INTRODUCTION

More information

Strategic Planning for HIV/AIDS

Strategic Planning for HIV/AIDS ASAP Regional Training on Epidemiological and Economic Tools for HIV/AIDS Strategic Planning S P Strategic Planning for HIV/AIDS Results-based Strategic Planning Stefano Bertozzi STRATEGIC PLAN S P A framework

More information

Using Probabilistic Reasoning to Develop Automatically Adapting Assistive

Using Probabilistic Reasoning to Develop Automatically Adapting Assistive From: AAAI Technical Report FS-96-05. Compilation copyright 1996, AAAI (www.aaai.org). All rights reserved. Using Probabilistic Reasoning to Develop Automatically Adapting Assistive Technology Systems

More information

Logistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision in Pune, India

Logistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision in Pune, India 20th International Congress on Modelling and Simulation, Adelaide, Australia, 1 6 December 2013 www.mssanz.org.au/modsim2013 Logistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision

More information