Research Article

A Threat Assessment Method for Unmanned Aerial Vehicle Based on Bayesian Networks under the Condition of Small Data Sets

Algorithm 1

Flowchart of the I_BIC_K2 algorithm.
Algorithm  _BIC_K2()
Input:- -the order of nodes  - -an upper bound of the number of the parent
     - -data set       - -expert constraint for edge existence
Output: 
   Initialize graph with no edge from variable set ;
   for i = 1 to
  ;
  ;
    while is true
      ;
      ;
      if
       ;
       ;
       Add an edge to graph ;
      else
       break;
      end if
   end while
   end for
  ;
   return ;