2014
DOI: 10.1155/2014/158652
|View full text |Cite
|
Sign up to set email alerts
|

Construction of Monitoring Model and Algorithm Design on Passenger Security during Shipping Based on Improved Bayesian Network

Abstract: A large number of data is needed by the computation of the objective Bayesian network, but the data is hard to get in actual computation. The calculation method of Bayesian network was improved in this paper, and the fuzzy-precise Bayesian network was obtained. Then, the fuzzy-precise Bayesian network was used to reason Bayesian network model when the data is limited. The security of passengers during shipping is affected by various factors, and it is hard to predict and control. The index system that has the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 10 publications
(10 reference statements)
0
2
0
Order By: Relevance
“…The most extensive cited studies were 139 citations for Shuliang et al [103], 76 citations are Jinsoo et al [82], and 60 citations for Huai et al [68], which are published in 2012, 2015, and 2017, respectively. Whereas the following studies have not received any citations: Tai-hua et al [46], Xiaoxue et al [48], and Xin et al [49] (published in 2020), Sabarathinam et al [56], Xiqiang et al [62], and Jamal et al [63] (published in 2019), Zhao et al [76] (published in 2016), Jiali et al [90], and Zeng Xianfeng [93] (published in 2014), and Mo Ming [102] (published in 2012). However, the record number of included articles per year is reported in Figure 5, which demonstrates the research trend of applying GT and BN to implement safety and security, based on the included studies.…”
Section: Citation Index Of Included Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The most extensive cited studies were 139 citations for Shuliang et al [103], 76 citations are Jinsoo et al [82], and 60 citations for Huai et al [68], which are published in 2012, 2015, and 2017, respectively. Whereas the following studies have not received any citations: Tai-hua et al [46], Xiaoxue et al [48], and Xin et al [49] (published in 2020), Sabarathinam et al [56], Xiqiang et al [62], and Jamal et al [63] (published in 2019), Zhao et al [76] (published in 2016), Jiali et al [90], and Zeng Xianfeng [93] (published in 2014), and Mo Ming [102] (published in 2012). However, the record number of included articles per year is reported in Figure 5, which demonstrates the research trend of applying GT and BN to implement safety and security, based on the included studies.…”
Section: Citation Index Of Included Studiesmentioning
confidence: 99%
“…In this SLR, it is observed that 43 out of 51 BN-based model have used less than 40 nodes. However, the remaining eight have used equal or more than 40, including Xiaoyan et al [65], Song et al [104], Zhiqiang et al [70], Xiqiang et al [85], Barry et al [54], Jiali et al [90], Remya et al [78], and Jinsoo et al [82], 40, 45, 47, 47, 51, 58, 60, and 64, respectively. However, all models that utilized GT and BN simultaneously have used less than 40 nodes in the developed system.…”
Section: Data Sources and Number Of Nodes Used To Construct Bn/gtmentioning
confidence: 99%