Research Article
A Threat Assessment Method for Unmanned Aerial Vehicle Based on Bayesian Networks under the Condition of Small Data Sets
Algorithm 1
Flowchart of the I_BIC_K2 algorithm.
Algorithm _BIC_K2() | Input: - -the order of nodes - -an upper bound of the number of the parent | - -data set - -expert constraint for edge existence | Output: | Initialize graph with no edge from variable set ; | for i = 1 to | ; | ; | while is true | ; | ; | if | ; | ; | Add an edge to graph ; | else | break; | end if | end while | end for | ; | return ; |
|