SlideShare a Scribd company logo
Bayesian Network :
A Bayesian network, also known as a Bayes network, belief network,
or probabilistic directed acyclic graphical model (PDAG), is a
graphical model that represents probabilistic relationships among a
set of variables. It is named after the Reverend Thomas Bayes, who
made significant contributions to probability theory. Bayesian
networks are particularly useful for reasoning under uncertainty and
are widely used in various fields, including artificial intelligence,
machine learning, statistics, and decision support systems.
Here are the key components and concepts associated with Bayesian
networks:
Nodes and Variables:
Nodes in a Bayesian network represent random variables, which can
be discrete or continuous.
Each node corresponds to a variable that may have an impact on or
be influenced by other variables.
Edges and Directed Acyclic Graph (DAG):
Edges between nodes represent probabilistic dependencies between
variables.
The graph is directed and acyclic, meaning that the edges have a
specific direction and do not form cycles.
Conditional Probability Tables (CPTs):
Each node in the network has an associated conditional probability
table (CPT).
The CPT specifies the conditional probability distribution of a node
given its parents in the graph.
For example, if node A has an edge to node B, the CPT for B will
specify the probability distribution of B given the values of A.
Inference:
Bayesian networks can be used for probabilistic inference, which
involves updating beliefs about the values of variables based on
observed evidence.
Given certain evidence (observed variable values), Bayesian
networks can compute the probability distribution of other variables
in the network.
Bayesian Rule:
Bayesian networks are built on the principles of Bayes' theorem,
which describes the probability of an event based on prior knowledge
of conditions that might be related to the event.
Learning:
Bayesian networks can be learned from data. Learning involves
estimating the parameters of the CPTs and the structure of the graph
from observed data.
Applications:
Bayesian networks find applications in a variety of fields, including
medical diagnosis, risk assessment, natural language processing,
image recognition, and expert systems.
Example:
Consider a Bayesian network for a medical diagnosis, where nodes
represent variables such as symptoms, diseases, and test results.
Edges represent the probabilistic relationships between these
variables, and CPTs specify the conditional probabilities based on
medical knowledge or data.
, Bayesian networks provide a formalism for representing and reasoning about
uncertain knowledge in a graphical and intuitive way, making them a valuable
tool for modeling complex systems in the presence of uncertainty.
Thus we can sum up that
A Bayesian Network is a directed acyclic graph:
 A graph where the directions are links which indicate dependencies that exist
between nodes.
 Nodes represent propositions about events or events themselves.
 Conditional probabilities quantify the strength of dependencies.
Consider a simple example:
The probability, that my car won't start.
If my car won't start then it is likely that
o The battery is flat or
o The staring motor is broken.
In order to decide whether to fix the car myself or send it to the garage I make
the
following decision:
If the headlights do not work then the battery is likely to be flat so I fix it
myself.
If the starting motor is defective then send car to garage.
If battery and starting motor both gone send car to garage.
The network to represent this is as follows:
Fig. A simple Bayesian network
Truth maintenance systems (TMS)
Truth Maintenance System (TMS) is a computational system used in artificial
intelligence and knowledge representation to manage and track information and
its dependencies. The primary purpose of a TMS is to keep track of the
consistency of a knowledge base and to efficiently update it when new information
is added or when conflicting information arises. TMS is particularly useful in
situations where information may change over time or where there is uncertainty.
Here are the key components and functions of a Truth Maintenance System:
Knowledge Base:
A knowledge base consists of a set of statements or beliefs. These statements
can be propositions, rules, or any other form of declarative knowledge.
Dependencies:
TMS maintains dependencies between statements in the knowledge base. When
one statement depends on another, it means that the truth of the dependent
statement is influenced by the truth of the statement it depends on.
Justifications:
Each statement in the knowledge base has associated justifications, which are the
reasons or evidence supporting the truth of that statement. Justifications point to
the statements on which the current statement depends.
Inference and Conflict Resolution:
TMS allows for the efficient propagation of changes in the knowledge base. When
a new piece of information is added or when conflicts arise, the TMS can
automatically update the dependencies and justifications to maintain a consistent
knowledge base.
Detecting and Handling Contradictions:
TMS is designed to detect contradictions or inconsistencies within the knowledge
base. When conflicting information arises, the system can trace back the
dependencies to identify the sources of the conflict.
Maintenance of Assumptions:
TMS can also maintain a record of assumptions made during the reasoning
process. If certain information is assumed to be true temporarily, the system
keeps track of these assumptions and can revisit them if needed.
Dynamic Knowledge Update:
TMS allows for dynamic updates to the knowledge base. As new information
becomes available or existing information is revised, the system can efficiently
update the dependencies and justifications.
Applications:
Truth Maintenance Systems are used in various AI applications, including expert
systems, diagnosis and troubleshooting systems, and intelligent agents. They are
particularly valuable in situations where the state of knowledge is subject to
change, and it's essential to maintain consistency and traceability.
 Truth maintenance systems (TMS) are also called reason maintenance
systems. They are used as a means to solve problems in the domain of
Artificial Intelligence when using rule-based inference systems. A TMS is
used to build and manage the dependency network that an inference
engine uses to solve problems. It is a knowledge representation method for
representing both beliefs and their dependencies. The name truth maintenance is due to the
ability of these systems to restore consistency. It is also termed as a belief revision system, a
truth maintenance system maintains consistency between old believed
knowledge and current believed knowledge in the knowledge base (KB) through revision. If
the current believed statements contradict the knowledge in KB, then the KB is updated with
the new knowledge. It may happen that the same data will again come into existence, and
the previous knowledge will be required in KB. If the previous data is not present, it is
required for new inference. But if the previous knowledge was in the KB, then no retracing of
the same knowledge was needed. Hence the use of TMS to avoid such retracing; it keeps
track of the contradictory data with the help of a dependency record. This record reflects the
retractions and additions which makes the inference engine (IE) aware of its current belief
set. ... There are two types of justification for each node. They are: Support List [SL] and
Conceptual Dependencies(CP) ...
What are the types of truth maintenance
system?
Truth Maintenance Systems (TMS) are used in artificial intelligence and
knowledge representation to manage information about the truth of statements in
a knowledge base. They help in tracking the dependencies between pieces of
information and handling updates or changes to the knowledge base. There are
different types of Truth Maintenance Systems, each with its characteristics. Here
are two common types:
Dependency-Directed Backtracking (DDB):
In a Dependency-Directed Backtracking TMS, the system maintains a directed
acyclic graph (DAG) representing the dependencies between pieces of
information. Each node in the graph corresponds to a statement or assertion, and
edges represent dependencies. When a piece of information changes, the system
can efficiently identify and backtrack through the graph, revisiting and updating
only the affected portions.
Assumption-Based Truth Maintenance System (ATMS):
The Assumption-Based Truth Maintenance System is based on the concept of
assumptions. It maintains a set of assumptions that are used to derive
conclusions. When a change occurs, the system reevaluates the assumptions
affected by the change, updating them accordingly. This approach is particularly
useful when dealing with conflicting information. The system keeps track of
multiple possible assumptions and their consequences.
These two types represent different approaches to handling the maintenance of
truth in a knowledge base. The choice between them often depends on the
specific requirements of the application and the characteristics of the knowledge
representation being used.
The another way to categorize : single-context and multi-context truth
maintenance. In single context systems, consistency is maintained among all
facts in memory (database). Multi-context systems allow consistency to be
relevant to a subset of facts in memory (a context) according to the history of
logical inference. This is achieved by tagging each fact or deduction with its
logical history. Multi-agent truth maintenance systems perform truth
maintenance across multiple memories, often located on different machines
In summary, a Truth Maintenance System is a powerful tool
for managing and updating a knowledge base, ensuring that
it remains consistent and reflective of the most current and
accurate information available.
.

More Related Content

Similar to Bayesian Network and Truth maintance system.doc

Dynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
Dynamic Rule Base Construction and Maintenance Scheme for Disease PredictionDynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
Dynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
ijsrd.com
 
Big Data Analytics.pptx
Big Data Analytics.pptxBig Data Analytics.pptx
Big Data Analytics.pptx
Kaviya452563
 
Unit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdfUnit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdf
Sitamarhi Institute of Technology
 
Unit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdfUnit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdf
Sitamarhi Institute of Technology
 
Unit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdfUnit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdf
Sitamarhi Institute of Technology
 
A survey of modified support vector machine using particle of swarm optimizat...
A survey of modified support vector machine using particle of swarm optimizat...A survey of modified support vector machine using particle of swarm optimizat...
A survey of modified support vector machine using particle of swarm optimizat...
Editor Jacotech
 
DETECTION OF LIVER INFECTION USING MACHINE LEARNING TECHNIQUES
DETECTION OF LIVER INFECTION USING MACHINE LEARNING TECHNIQUESDETECTION OF LIVER INFECTION USING MACHINE LEARNING TECHNIQUES
DETECTION OF LIVER INFECTION USING MACHINE LEARNING TECHNIQUES
IRJET Journal
 
Datamining
DataminingDatamining
Datamining
Debashis Pradhan
 
Research Papar
Research PaparResearch Papar
Research Papar
AJAY SHARMA
 
Smart Health Prediction Report
Smart Health Prediction ReportSmart Health Prediction Report
Smart Health Prediction Report
Arhind Gautam
 
Seminar report irm
Seminar report irmSeminar report irm
Seminar report irm
Arhind Gautam
 
Seminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTIONSeminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTION
Arhind Gautam
 
Machine Learning for the System Administrator
Machine Learning for the System AdministratorMachine Learning for the System Administrator
Machine Learning for the System Administrator
butest
 
Ms 07 information systems for managers
Ms   07 information systems for managersMs   07 information systems for managers
Ms 07 information systems for managers
smumbahelp
 
Unit 3
Unit 3Unit 3
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINERANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
IJCSEA Journal
 
The role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha KrishnanThe role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha Krishnan
sunanthakrishnan
 
Intro to Deep Learning for Medical Image Analysis, with Dan Lee from Dentuit AI
Intro to Deep Learning for Medical Image Analysis, with Dan Lee from Dentuit AIIntro to Deep Learning for Medical Image Analysis, with Dan Lee from Dentuit AI
Intro to Deep Learning for Medical Image Analysis, with Dan Lee from Dentuit AI
Seth Grimes
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107
IJRAT
 
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Mumbai Academisc
 

Similar to Bayesian Network and Truth maintance system.doc (20)

Dynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
Dynamic Rule Base Construction and Maintenance Scheme for Disease PredictionDynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
Dynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
 
Big Data Analytics.pptx
Big Data Analytics.pptxBig Data Analytics.pptx
Big Data Analytics.pptx
 
Unit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdfUnit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdf
 
Unit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdfUnit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdf
 
Unit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdfUnit-3 Data Analytics.pdf
Unit-3 Data Analytics.pdf
 
A survey of modified support vector machine using particle of swarm optimizat...
A survey of modified support vector machine using particle of swarm optimizat...A survey of modified support vector machine using particle of swarm optimizat...
A survey of modified support vector machine using particle of swarm optimizat...
 
DETECTION OF LIVER INFECTION USING MACHINE LEARNING TECHNIQUES
DETECTION OF LIVER INFECTION USING MACHINE LEARNING TECHNIQUESDETECTION OF LIVER INFECTION USING MACHINE LEARNING TECHNIQUES
DETECTION OF LIVER INFECTION USING MACHINE LEARNING TECHNIQUES
 
Datamining
DataminingDatamining
Datamining
 
Research Papar
Research PaparResearch Papar
Research Papar
 
Smart Health Prediction Report
Smart Health Prediction ReportSmart Health Prediction Report
Smart Health Prediction Report
 
Seminar report irm
Seminar report irmSeminar report irm
Seminar report irm
 
Seminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTIONSeminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTION
 
Machine Learning for the System Administrator
Machine Learning for the System AdministratorMachine Learning for the System Administrator
Machine Learning for the System Administrator
 
Ms 07 information systems for managers
Ms   07 information systems for managersMs   07 information systems for managers
Ms 07 information systems for managers
 
Unit 3
Unit 3Unit 3
Unit 3
 
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINERANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINER
 
The role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha KrishnanThe role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha Krishnan
 
Intro to Deep Learning for Medical Image Analysis, with Dan Lee from Dentuit AI
Intro to Deep Learning for Medical Image Analysis, with Dan Lee from Dentuit AIIntro to Deep Learning for Medical Image Analysis, with Dan Lee from Dentuit AI
Intro to Deep Learning for Medical Image Analysis, with Dan Lee from Dentuit AI
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107
 
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
 

Recently uploaded

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 

Recently uploaded (20)

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 

Bayesian Network and Truth maintance system.doc

  • 1. Bayesian Network : A Bayesian network, also known as a Bayes network, belief network, or probabilistic directed acyclic graphical model (PDAG), is a graphical model that represents probabilistic relationships among a set of variables. It is named after the Reverend Thomas Bayes, who made significant contributions to probability theory. Bayesian networks are particularly useful for reasoning under uncertainty and are widely used in various fields, including artificial intelligence, machine learning, statistics, and decision support systems. Here are the key components and concepts associated with Bayesian networks: Nodes and Variables: Nodes in a Bayesian network represent random variables, which can be discrete or continuous. Each node corresponds to a variable that may have an impact on or be influenced by other variables. Edges and Directed Acyclic Graph (DAG): Edges between nodes represent probabilistic dependencies between variables. The graph is directed and acyclic, meaning that the edges have a specific direction and do not form cycles. Conditional Probability Tables (CPTs): Each node in the network has an associated conditional probability table (CPT). The CPT specifies the conditional probability distribution of a node given its parents in the graph. For example, if node A has an edge to node B, the CPT for B will specify the probability distribution of B given the values of A. Inference: Bayesian networks can be used for probabilistic inference, which involves updating beliefs about the values of variables based on observed evidence. Given certain evidence (observed variable values), Bayesian networks can compute the probability distribution of other variables in the network. Bayesian Rule: Bayesian networks are built on the principles of Bayes' theorem, which describes the probability of an event based on prior knowledge of conditions that might be related to the event.
  • 2. Learning: Bayesian networks can be learned from data. Learning involves estimating the parameters of the CPTs and the structure of the graph from observed data. Applications: Bayesian networks find applications in a variety of fields, including medical diagnosis, risk assessment, natural language processing, image recognition, and expert systems. Example: Consider a Bayesian network for a medical diagnosis, where nodes represent variables such as symptoms, diseases, and test results. Edges represent the probabilistic relationships between these variables, and CPTs specify the conditional probabilities based on medical knowledge or data. , Bayesian networks provide a formalism for representing and reasoning about uncertain knowledge in a graphical and intuitive way, making them a valuable tool for modeling complex systems in the presence of uncertainty. Thus we can sum up that A Bayesian Network is a directed acyclic graph:  A graph where the directions are links which indicate dependencies that exist between nodes.  Nodes represent propositions about events or events themselves.  Conditional probabilities quantify the strength of dependencies. Consider a simple example: The probability, that my car won't start. If my car won't start then it is likely that o The battery is flat or o The staring motor is broken. In order to decide whether to fix the car myself or send it to the garage I make the following decision: If the headlights do not work then the battery is likely to be flat so I fix it myself. If the starting motor is defective then send car to garage.
  • 3. If battery and starting motor both gone send car to garage. The network to represent this is as follows: Fig. A simple Bayesian network Truth maintenance systems (TMS) Truth Maintenance System (TMS) is a computational system used in artificial intelligence and knowledge representation to manage and track information and its dependencies. The primary purpose of a TMS is to keep track of the consistency of a knowledge base and to efficiently update it when new information is added or when conflicting information arises. TMS is particularly useful in situations where information may change over time or where there is uncertainty. Here are the key components and functions of a Truth Maintenance System:
  • 4. Knowledge Base: A knowledge base consists of a set of statements or beliefs. These statements can be propositions, rules, or any other form of declarative knowledge. Dependencies: TMS maintains dependencies between statements in the knowledge base. When one statement depends on another, it means that the truth of the dependent statement is influenced by the truth of the statement it depends on. Justifications: Each statement in the knowledge base has associated justifications, which are the reasons or evidence supporting the truth of that statement. Justifications point to the statements on which the current statement depends. Inference and Conflict Resolution: TMS allows for the efficient propagation of changes in the knowledge base. When a new piece of information is added or when conflicts arise, the TMS can automatically update the dependencies and justifications to maintain a consistent knowledge base. Detecting and Handling Contradictions: TMS is designed to detect contradictions or inconsistencies within the knowledge base. When conflicting information arises, the system can trace back the dependencies to identify the sources of the conflict. Maintenance of Assumptions: TMS can also maintain a record of assumptions made during the reasoning process. If certain information is assumed to be true temporarily, the system keeps track of these assumptions and can revisit them if needed. Dynamic Knowledge Update: TMS allows for dynamic updates to the knowledge base. As new information becomes available or existing information is revised, the system can efficiently update the dependencies and justifications.
  • 5. Applications: Truth Maintenance Systems are used in various AI applications, including expert systems, diagnosis and troubleshooting systems, and intelligent agents. They are particularly valuable in situations where the state of knowledge is subject to change, and it's essential to maintain consistency and traceability.  Truth maintenance systems (TMS) are also called reason maintenance systems. They are used as a means to solve problems in the domain of Artificial Intelligence when using rule-based inference systems. A TMS is used to build and manage the dependency network that an inference engine uses to solve problems. It is a knowledge representation method for representing both beliefs and their dependencies. The name truth maintenance is due to the ability of these systems to restore consistency. It is also termed as a belief revision system, a truth maintenance system maintains consistency between old believed knowledge and current believed knowledge in the knowledge base (KB) through revision. If the current believed statements contradict the knowledge in KB, then the KB is updated with the new knowledge. It may happen that the same data will again come into existence, and the previous knowledge will be required in KB. If the previous data is not present, it is required for new inference. But if the previous knowledge was in the KB, then no retracing of the same knowledge was needed. Hence the use of TMS to avoid such retracing; it keeps track of the contradictory data with the help of a dependency record. This record reflects the retractions and additions which makes the inference engine (IE) aware of its current belief set. ... There are two types of justification for each node. They are: Support List [SL] and Conceptual Dependencies(CP) ...
  • 6.
  • 7. What are the types of truth maintenance system? Truth Maintenance Systems (TMS) are used in artificial intelligence and knowledge representation to manage information about the truth of statements in a knowledge base. They help in tracking the dependencies between pieces of information and handling updates or changes to the knowledge base. There are different types of Truth Maintenance Systems, each with its characteristics. Here are two common types: Dependency-Directed Backtracking (DDB): In a Dependency-Directed Backtracking TMS, the system maintains a directed acyclic graph (DAG) representing the dependencies between pieces of information. Each node in the graph corresponds to a statement or assertion, and edges represent dependencies. When a piece of information changes, the system can efficiently identify and backtrack through the graph, revisiting and updating only the affected portions. Assumption-Based Truth Maintenance System (ATMS): The Assumption-Based Truth Maintenance System is based on the concept of assumptions. It maintains a set of assumptions that are used to derive conclusions. When a change occurs, the system reevaluates the assumptions affected by the change, updating them accordingly. This approach is particularly useful when dealing with conflicting information. The system keeps track of multiple possible assumptions and their consequences. These two types represent different approaches to handling the maintenance of truth in a knowledge base. The choice between them often depends on the specific requirements of the application and the characteristics of the knowledge representation being used.
  • 8. The another way to categorize : single-context and multi-context truth maintenance. In single context systems, consistency is maintained among all facts in memory (database). Multi-context systems allow consistency to be relevant to a subset of facts in memory (a context) according to the history of logical inference. This is achieved by tagging each fact or deduction with its logical history. Multi-agent truth maintenance systems perform truth maintenance across multiple memories, often located on different machines In summary, a Truth Maintenance System is a powerful tool for managing and updating a knowledge base, ensuring that it remains consistent and reflective of the most current and accurate information available. .