SlideShare a Scribd company logo
1.5
Bayes‘Theorem and Its Applications
One of the important applications of the conditional probability is in the
computation of unknown probabilities on the basis of the information supplied by
the experiment or past records. For example, suppose an event has occurred
through one of the various mutually exclusive events or reasons. Then the
conditional probability that it has occurred due to a particular event or reason is
called it as inverse or posteriori probability. These probabilities are computed by
Bayes’ theorem, named so after the British mathematician Thomas Bayes who
propounded it in . The revision of old (given) probabilities in the list of the
additional information supplied by the experiment or past records is of extreme
help in arriving at valid decisions in the face of uncertainty.
Bayes’ Theorem (Rule for the Inverse Probability)
Let be be mutually exclusive and exhaustive events in the sample
space with for . Let be an arbitrary event which is a
subset of
1
n
i
i
E

such that . Then
 
   
   
   
 
1
. | . |
|
. |

 

i i i i
i n
i
i i
i
P E P A E P E P A E
P E A
P E
P E P A E
for
Proof: Since
1
n
i
i
A E

 , we have  
1 1
n n
i i
i i
A A E A E
 
 
    
 
.
Since are mutually exclusive events, we have by
addition theorem of probability
   
1
n
i
i
P A P A E

 
  
 
 
1
n
i
i
P A E

 
     
1
. |

  
n
i i
i
P A P E P A E (By multiplication theorem of probability)
Also we have
 
   
   
1
. |
|
. |

 

i i
i n
i i
i
P E P A E
P E A
P E P A E
for
which is the Bayes’ rule.
Note:
1. The probabilities are known as the ‘a priori
probabilities’, because they exist before we gain any information from the
experiment itself.
2. The probabilities are called ‘likelihoods’ because they
indicate how likely the event under consideration is to occur, given each and
every a priori probability.
3. The probabilities are called ‘posteriori probabilities’
because they are determined after the results of the experiment are known.
4.      
1
. |

 
n
i i
i
P A P E P A E is known as total probability.
5. Bayes’ theorem is extensively used by business, management and engineering
executives in arriving at valid decisions in the face of uncertainty.
Example 1: In a bolt factory machines manufacutre respectively
and of the total. Of their output percent are known to
be defective bolts. A bolt is drawn at random from the product and is found to
be defective. What are the probabilities that it was manufactured by
(i) Machine .
(ii) Machine or
Solution: Let and denote respectively the events that the bolt selected
at random is manufactured by the machines and respectively and let
denote the event that it is defective. Then we have:
Total
1
(i) Hence, the probability that a defective bolt chosen at random is
manufactured by factory is given by Bayes’ rule as:
(ii) Similarly,
;
Hence, the probability that a defective bolt chosen at random is manufactured by
machine or is:
(OR Required probability is equal to )
Aliter: TREE DIAGRAM
From the above diagram the probability that a defective bolt is manufactured by
factory is
Similarly, and
Hence, the probability that a defective bolt chosen at random is manufactured by
machine or is:
(OR Required probability is equal to )
Remark: Since is greatest, on the basis of ‘a priori’ probabilities alone, we
are likely to conclude that a defective bolt drawn at random from the product is
manufactured by machine . After using the additional information we obtained
the posterior probabilities which give as maximum. Thus, we shall now
say that it is probable that the defective bolt has been manufactured by
machine , a result which is different from the earlier conclusion. However, latter
conclusion is a much valid conclusion as it is based on the entire information at
our disposal. Thus, Bayes’s rule provides a very powerful tool in improving the
quality of probability and this helps the management executives in arriving at
valid decisions in the face of uncertainty. Thus, the additional information reduces
the importance of the prior probabilities. The only requirement for the use of
Bayesian rule is that all the hypotheses under consideration must be valid and
that none is assigned ‘a prior’ probability or .
Example 2: In a railway reservation office, two clerks are engaged in checking
reservation forms. On an average, the first clerk checks of the forms,
while the second does the remaining. The first clerk has an error rate of
and second has an error rate of reservation form is selected at random
from the total number of forms checked during a day, and is found to have an
error. Find the probability that it was checked (i) by the first (ii) by the second
clerk.
Solution: Let us define the following events:
: The selected form is checked by clerk .
: The selected form is checked by clerk .
: The selected form has an error.
Then we are given:
; ;
;
Required to find and . By Bayes’ Rule the probability that the
form containing the error was checked by clerk , is given by;
Similarly, the probability that the form containing the error was checked by clerk
, is given by
(OR )
Example 3: The results of an investigating by an expert on a fire accident in a
skyscraper are summarized below:
(i) Prob. (there could have been short circuit)
(ii) Prob. (LPG cylinder explosion)
(iii) Chance of fire accident is given a short circuit and given an LPG
explosion.
Based on these, what do you think is the most probable cause of fire?
Solution: Let us define the following events:
: Short circuit ; : LPG explosion ; : Fire accident
Then, we are given:
; ;
;
By Bayes’ Rule:
(OR )
Since , short circuit is the most probable cause of fire.
Example 4: The contents of urns and are respectively as follows:
white, black and red balls,
white, black and red balls, and
white, black and red balls.
One urn is chosen at random and two balls drawn. They happen to be white and
red. What is the probability that they came from urns ?
Solution:
Let and denote the events of choosing 1st
, 2nd
and 3rd
urn respectively
and let be the event that the two balls drawn from the selected urn are white
and red. Then we have:
We have:
Hence by Bayes’s rule, the probability that the two white and red balls drawn are
from 1st
urn is:
Similarly, we have
and ( Or

More Related Content

What's hot

Software Requirement Specification (SRS) on Result Analysis Tool
Software Requirement Specification (SRS) on Result Analysis ToolSoftware Requirement Specification (SRS) on Result Analysis Tool
Software Requirement Specification (SRS) on Result Analysis Tool
Minhas Kamal
 
Software Verification & Validation
Software Verification & ValidationSoftware Verification & Validation
Software Verification & Validation
university of education,Lahore
 
Présentation Méthode EBIOS Risk Manager
Présentation Méthode EBIOS Risk ManagerPrésentation Méthode EBIOS Risk Manager
Présentation Méthode EBIOS Risk Manager
Comsoce
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Conix - EBIOS Risk Manager
Conix - EBIOS Risk ManagerConix - EBIOS Risk Manager
Conix - EBIOS Risk Manager
Thierry Pertus
 
EBIOS
EBIOSEBIOS
Software and Hardware Reliability
Software and Hardware ReliabilitySoftware and Hardware Reliability
Software and Hardware ReliabilitySandeep Patalay
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
Saqib Raza
 
Cloud Testing - A New Age Approach to Testing
Cloud Testing - A New Age Approach to TestingCloud Testing - A New Age Approach to Testing
Cloud Testing - A New Age Approach to Testing
Software Testing Solution
 
10 Backpropagation Algorithm for Neural Networks (1).pptx
10 Backpropagation Algorithm for Neural Networks (1).pptx10 Backpropagation Algorithm for Neural Networks (1).pptx
10 Backpropagation Algorithm for Neural Networks (1).pptx
SaifKhan703888
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
Operational Security
Operational SecurityOperational Security
Operational Security
Splunk
 
OpenVAS
OpenVASOpenVAS
OpenVAS
svm
 
Black box and white box testing
Black box and white box testingBlack box and white box testing
Black box and white box testing
AWADHESH PRATAP SINGH UNIVERSITY, REWA (M.P.)
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
Security Bootcamp
 
Chapter 7 software reliability
Chapter 7 software reliabilityChapter 7 software reliability
Chapter 7 software reliability
despicable me
 
Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
Elkanouni Mohamed
 
Google Dorks
Google DorksGoogle Dorks
Google Dorks
Andrea D'Ubaldo
 
Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
Lionel Faleiro
 

What's hot (20)

Software Requirement Specification (SRS) on Result Analysis Tool
Software Requirement Specification (SRS) on Result Analysis ToolSoftware Requirement Specification (SRS) on Result Analysis Tool
Software Requirement Specification (SRS) on Result Analysis Tool
 
Software Verification & Validation
Software Verification & ValidationSoftware Verification & Validation
Software Verification & Validation
 
Présentation Méthode EBIOS Risk Manager
Présentation Méthode EBIOS Risk ManagerPrésentation Méthode EBIOS Risk Manager
Présentation Méthode EBIOS Risk Manager
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Conix - EBIOS Risk Manager
Conix - EBIOS Risk ManagerConix - EBIOS Risk Manager
Conix - EBIOS Risk Manager
 
EBIOS
EBIOSEBIOS
EBIOS
 
Software and Hardware Reliability
Software and Hardware ReliabilitySoftware and Hardware Reliability
Software and Hardware Reliability
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
 
Cloud Testing - A New Age Approach to Testing
Cloud Testing - A New Age Approach to TestingCloud Testing - A New Age Approach to Testing
Cloud Testing - A New Age Approach to Testing
 
10 Backpropagation Algorithm for Neural Networks (1).pptx
10 Backpropagation Algorithm for Neural Networks (1).pptx10 Backpropagation Algorithm for Neural Networks (1).pptx
10 Backpropagation Algorithm for Neural Networks (1).pptx
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
Operational Security
Operational SecurityOperational Security
Operational Security
 
OpenVAS
OpenVASOpenVAS
OpenVAS
 
Black box and white box testing
Black box and white box testingBlack box and white box testing
Black box and white box testing
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Chapter 7 software reliability
Chapter 7 software reliabilityChapter 7 software reliability
Chapter 7 software reliability
 
Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
 
Google Dorks
Google DorksGoogle Dorks
Google Dorks
 
Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
 

Similar to M 1.5 rm

Mth263 lecture 4
Mth263 lecture 4Mth263 lecture 4
Mth263 lecture 4tariq88
 
Bayes theorem
Bayes theoremBayes theorem
Bayes theorem
Thuy An Dang
 
BayesTheorem.pdf
BayesTheorem.pdfBayesTheorem.pdf
BayesTheorem.pdf
ZiaulKRIM
 
102 Creating Value with Real Options
102 Creating Value with Real Options102 Creating Value with Real Options
102 Creating Value with Real Options
mjvandenplas
 
Christian decision making
Christian decision makingChristian decision making
Christian decision making
Christian Tobing
 
presentation data fusion methods ex.pptx
presentation data fusion methods ex.pptxpresentation data fusion methods ex.pptx
presentation data fusion methods ex.pptx
Julius346776
 
Hypothesis TestingThe Right HypothesisIn business, or an.docx
Hypothesis TestingThe Right HypothesisIn business, or an.docxHypothesis TestingThe Right HypothesisIn business, or an.docx
Hypothesis TestingThe Right HypothesisIn business, or an.docx
adampcarr67227
 
Math138 lectures 3rd edition scoolbook
Math138 lectures 3rd edition scoolbookMath138 lectures 3rd edition scoolbook
Math138 lectures 3rd edition scoolbookesbunag
 
Understanding Uncertainty.pdf
Understanding Uncertainty.pdfUnderstanding Uncertainty.pdf
Understanding Uncertainty.pdf
MohanadHussien2
 
Bayes' theorem
Bayes' theoremBayes' theorem
Bayes' theorem
Dr. C.V. Suresh Babu
 
Ppt unit-05-mbf103
Ppt unit-05-mbf103Ppt unit-05-mbf103
Ppt unit-05-mbf103Vibha Nayak
 
Naive bayes
Naive bayesNaive bayes
Naive bayes
ChetnaChandwani3
 
RBI and Bayes' rule
RBI and Bayes' ruleRBI and Bayes' rule
RBI and Bayes' rule
Riccardo Cozza
 
Running head ACCIDENT INVESTIGATION1ACCIDENT INVESTIGATION5.docx
Running head ACCIDENT INVESTIGATION1ACCIDENT INVESTIGATION5.docxRunning head ACCIDENT INVESTIGATION1ACCIDENT INVESTIGATION5.docx
Running head ACCIDENT INVESTIGATION1ACCIDENT INVESTIGATION5.docx
SUBHI7
 
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
zenAlkaff
 
1675091151425_Process Management Risk.pptx
1675091151425_Process Management Risk.pptx1675091151425_Process Management Risk.pptx
1675091151425_Process Management Risk.pptx
ZerayacobTeklearegay
 

Similar to M 1.5 rm (20)

Mth263 lecture 4
Mth263 lecture 4Mth263 lecture 4
Mth263 lecture 4
 
Int journal of cf hs91aim
Int journal of cf hs91aimInt journal of cf hs91aim
Int journal of cf hs91aim
 
Bayes theorem
Bayes theoremBayes theorem
Bayes theorem
 
BayesTheorem.pdf
BayesTheorem.pdfBayesTheorem.pdf
BayesTheorem.pdf
 
102 Creating Value with Real Options
102 Creating Value with Real Options102 Creating Value with Real Options
102 Creating Value with Real Options
 
MU IBMS 2015
MU IBMS 2015MU IBMS 2015
MU IBMS 2015
 
Bayes
BayesBayes
Bayes
 
Christian decision making
Christian decision makingChristian decision making
Christian decision making
 
presentation data fusion methods ex.pptx
presentation data fusion methods ex.pptxpresentation data fusion methods ex.pptx
presentation data fusion methods ex.pptx
 
Hypothesis TestingThe Right HypothesisIn business, or an.docx
Hypothesis TestingThe Right HypothesisIn business, or an.docxHypothesis TestingThe Right HypothesisIn business, or an.docx
Hypothesis TestingThe Right HypothesisIn business, or an.docx
 
Math138 lectures 3rd edition scoolbook
Math138 lectures 3rd edition scoolbookMath138 lectures 3rd edition scoolbook
Math138 lectures 3rd edition scoolbook
 
Understanding Uncertainty.pdf
Understanding Uncertainty.pdfUnderstanding Uncertainty.pdf
Understanding Uncertainty.pdf
 
Bayes' theorem
Bayes' theoremBayes' theorem
Bayes' theorem
 
Ppt unit-05-mbf103
Ppt unit-05-mbf103Ppt unit-05-mbf103
Ppt unit-05-mbf103
 
Chapter11 (1)
Chapter11 (1)Chapter11 (1)
Chapter11 (1)
 
Naive bayes
Naive bayesNaive bayes
Naive bayes
 
RBI and Bayes' rule
RBI and Bayes' ruleRBI and Bayes' rule
RBI and Bayes' rule
 
Running head ACCIDENT INVESTIGATION1ACCIDENT INVESTIGATION5.docx
Running head ACCIDENT INVESTIGATION1ACCIDENT INVESTIGATION5.docxRunning head ACCIDENT INVESTIGATION1ACCIDENT INVESTIGATION5.docx
Running head ACCIDENT INVESTIGATION1ACCIDENT INVESTIGATION5.docx
 
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
 
1675091151425_Process Management Risk.pptx
1675091151425_Process Management Risk.pptx1675091151425_Process Management Risk.pptx
1675091151425_Process Management Risk.pptx
 

More from Ramakrishna Paduchuri

M 1.5 p1.s
M 1.5 p1.sM 1.5 p1.s
M 1.4 ap1
M 1.4 ap1M 1.4 ap1
Ma2002 1.21 rm
Ma2002 1.21 rmMa2002 1.21 rm
Ma2002 1.21 rm
Ramakrishna Paduchuri
 
Ma2002 1.19 rm
Ma2002 1.19 rmMa2002 1.19 rm
Ma2002 1.19 rm
Ramakrishna Paduchuri
 
Ma2002 1.18 rm
Ma2002 1.18 rmMa2002 1.18 rm
Ma2002 1.18 rm
Ramakrishna Paduchuri
 
Ma2002 1.17 rm
Ma2002 1.17 rmMa2002 1.17 rm
Ma2002 1.17 rm
Ramakrishna Paduchuri
 

More from Ramakrishna Paduchuri (20)

M 1.5 p4.s
M 1.5 p4.sM 1.5 p4.s
M 1.5 p4.s
 
M 1.5 p4.q
M 1.5 p4.qM 1.5 p4.q
M 1.5 p4.q
 
M 1.5 p3.s
M 1.5 p3.sM 1.5 p3.s
M 1.5 p3.s
 
M 1.5 p3.q
M 1.5 p3.qM 1.5 p3.q
M 1.5 p3.q
 
M 1.5 p2.s
M 1.5 p2.sM 1.5 p2.s
M 1.5 p2.s
 
M 1.5 p2.q
M 1.5 p2.qM 1.5 p2.q
M 1.5 p2.q
 
M 1.5 p1.s
M 1.5 p1.sM 1.5 p1.s
M 1.5 p1.s
 
M 1.5 p1.q
M 1.5 p1.qM 1.5 p1.q
M 1.5 p1.q
 
M 1.4 rm
M 1.4 rmM 1.4 rm
M 1.4 rm
 
M 1.4 ap1
M 1.4 ap1M 1.4 ap1
M 1.4 ap1
 
M 1.3 rm
M 1.3 rmM 1.3 rm
M 1.3 rm
 
M 1.1 rm
M 1.1 rmM 1.1 rm
M 1.1 rm
 
M 1.3 ap1
M 1.3 ap1M 1.3 ap1
M 1.3 ap1
 
Ma2002 1.23 rm
Ma2002 1.23 rmMa2002 1.23 rm
Ma2002 1.23 rm
 
Ma2002 1.22 rm
Ma2002 1.22 rmMa2002 1.22 rm
Ma2002 1.22 rm
 
Ma2002 1.21 rm
Ma2002 1.21 rmMa2002 1.21 rm
Ma2002 1.21 rm
 
Ma2002 1.20 rm
Ma2002 1.20 rmMa2002 1.20 rm
Ma2002 1.20 rm
 
Ma2002 1.19 rm
Ma2002 1.19 rmMa2002 1.19 rm
Ma2002 1.19 rm
 
Ma2002 1.18 rm
Ma2002 1.18 rmMa2002 1.18 rm
Ma2002 1.18 rm
 
Ma2002 1.17 rm
Ma2002 1.17 rmMa2002 1.17 rm
Ma2002 1.17 rm
 

Recently uploaded

Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 

Recently uploaded (20)

Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 

M 1.5 rm

  • 1. 1.5 Bayes‘Theorem and Its Applications One of the important applications of the conditional probability is in the computation of unknown probabilities on the basis of the information supplied by the experiment or past records. For example, suppose an event has occurred through one of the various mutually exclusive events or reasons. Then the conditional probability that it has occurred due to a particular event or reason is called it as inverse or posteriori probability. These probabilities are computed by Bayes’ theorem, named so after the British mathematician Thomas Bayes who propounded it in . The revision of old (given) probabilities in the list of the additional information supplied by the experiment or past records is of extreme help in arriving at valid decisions in the face of uncertainty. Bayes’ Theorem (Rule for the Inverse Probability) Let be be mutually exclusive and exhaustive events in the sample space with for . Let be an arbitrary event which is a subset of 1 n i i E  such that . Then                 1 . | . | | . |     i i i i i n i i i i P E P A E P E P A E P E A P E P E P A E for Proof: Since 1 n i i A E   , we have   1 1 n n i i i i A A E A E            . Since are mutually exclusive events, we have by addition theorem of probability     1 n i i P A P A E           1 n i i P A E   
  • 2.       1 . |     n i i i P A P E P A E (By multiplication theorem of probability) Also we have           1 . | | . |     i i i n i i i P E P A E P E A P E P A E for which is the Bayes’ rule. Note: 1. The probabilities are known as the ‘a priori probabilities’, because they exist before we gain any information from the experiment itself. 2. The probabilities are called ‘likelihoods’ because they indicate how likely the event under consideration is to occur, given each and every a priori probability. 3. The probabilities are called ‘posteriori probabilities’ because they are determined after the results of the experiment are known. 4.       1 . |    n i i i P A P E P A E is known as total probability. 5. Bayes’ theorem is extensively used by business, management and engineering executives in arriving at valid decisions in the face of uncertainty. Example 1: In a bolt factory machines manufacutre respectively and of the total. Of their output percent are known to be defective bolts. A bolt is drawn at random from the product and is found to be defective. What are the probabilities that it was manufactured by (i) Machine . (ii) Machine or
  • 3. Solution: Let and denote respectively the events that the bolt selected at random is manufactured by the machines and respectively and let denote the event that it is defective. Then we have: Total 1 (i) Hence, the probability that a defective bolt chosen at random is manufactured by factory is given by Bayes’ rule as: (ii) Similarly, ; Hence, the probability that a defective bolt chosen at random is manufactured by machine or is: (OR Required probability is equal to )
  • 4. Aliter: TREE DIAGRAM From the above diagram the probability that a defective bolt is manufactured by factory is Similarly, and Hence, the probability that a defective bolt chosen at random is manufactured by machine or is: (OR Required probability is equal to ) Remark: Since is greatest, on the basis of ‘a priori’ probabilities alone, we are likely to conclude that a defective bolt drawn at random from the product is manufactured by machine . After using the additional information we obtained the posterior probabilities which give as maximum. Thus, we shall now say that it is probable that the defective bolt has been manufactured by machine , a result which is different from the earlier conclusion. However, latter conclusion is a much valid conclusion as it is based on the entire information at our disposal. Thus, Bayes’s rule provides a very powerful tool in improving the quality of probability and this helps the management executives in arriving at
  • 5. valid decisions in the face of uncertainty. Thus, the additional information reduces the importance of the prior probabilities. The only requirement for the use of Bayesian rule is that all the hypotheses under consideration must be valid and that none is assigned ‘a prior’ probability or . Example 2: In a railway reservation office, two clerks are engaged in checking reservation forms. On an average, the first clerk checks of the forms, while the second does the remaining. The first clerk has an error rate of and second has an error rate of reservation form is selected at random from the total number of forms checked during a day, and is found to have an error. Find the probability that it was checked (i) by the first (ii) by the second clerk. Solution: Let us define the following events: : The selected form is checked by clerk . : The selected form is checked by clerk . : The selected form has an error. Then we are given: ; ; ; Required to find and . By Bayes’ Rule the probability that the form containing the error was checked by clerk , is given by; Similarly, the probability that the form containing the error was checked by clerk , is given by
  • 6. (OR ) Example 3: The results of an investigating by an expert on a fire accident in a skyscraper are summarized below: (i) Prob. (there could have been short circuit) (ii) Prob. (LPG cylinder explosion) (iii) Chance of fire accident is given a short circuit and given an LPG explosion. Based on these, what do you think is the most probable cause of fire? Solution: Let us define the following events: : Short circuit ; : LPG explosion ; : Fire accident Then, we are given: ; ; ; By Bayes’ Rule: (OR ) Since , short circuit is the most probable cause of fire.
  • 7. Example 4: The contents of urns and are respectively as follows: white, black and red balls, white, black and red balls, and white, black and red balls. One urn is chosen at random and two balls drawn. They happen to be white and red. What is the probability that they came from urns ? Solution: Let and denote the events of choosing 1st , 2nd and 3rd urn respectively and let be the event that the two balls drawn from the selected urn are white and red. Then we have: We have: Hence by Bayes’s rule, the probability that the two white and red balls drawn are from 1st urn is: