Skip to main content

Extraction of Bayesian Networks from Large Unstructured Datasets

  • Chapter
  • First Online:
Big-Data Analytics and Cloud Computing

Abstract

Bayesian networks (BNs) provide a useful modelling tool with a wide applicability on a variety of research and business areas. However, their construction is very time-consuming when carried out manually. In this chapter, we discuss an automated method to identify, assess and aggregate relevant information from large unstructured datasets to build fragments of BNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pearl J (1998) Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann Publishers, San Francisco

    MATH  Google Scholar 

  2. Ghazi A, Laskey K, Wang X et al (2006) Detecting threatening behavior using Bayesian networks. C4I papers

    Google Scholar 

  3. Chen, H (2008) Homeland security data mining using social network analysis. In: IEEE international conference on intelligence and security informatics. Taipei

    Google Scholar 

  4. McKenna JA (2004) The internet and social life. Annu Rev Psychol 55:573–590

    Article  Google Scholar 

  5. Poelmans JE (2010) Formal concept analysis in knowledge discovery: a survey. In: International conference on conceptual structures (ICCS). Kuching, Sarawak, Malaysia

    Google Scholar 

  6. Sanchez-Graillet O, Poesio M (2004) Acquiring Bayesian networks from text. In: LREC

    Google Scholar 

  7. Liddy ED (2001) A robust risk minimization based named entity recognition system. In: Krish K (ed) Encyclopedia of library and information science. Marcel Decker, New York

    Google Scholar 

  8. Manning CD, Schutze H (1999) Foundations of statistical natural language processing. MIT Press, Cambridge, MA

    MATH  Google Scholar 

  9. Lothaire M (2005) Symbolic natural language processing. In: Applied combinatorics on words. Encyclopedia of mathematics and its applications (No. 105). Cambridge University Press, Cambridge, pp 164–209. Available from: Cambridge Books Online, http://dx.doi.org/10.1017/CBO9781107341005.004

  10. Troussov A, Sogrin A, Judge J, Botvich D (2008) Mining socio-semantic networks using spreading activation technique. In: Proceedings of the I-KNOW ’08 and I-MEDIA ’08, Graz, 3–5 Sept 2008

    Google Scholar 

  11. Dale R, Moisl H, Somers HL (2000) Handbook of natural language processing. Marcel Dekker, New York

    Google Scholar 

  12. Korhonen A, Krymolowski Y (2006) A large subcategorisation lexicon for natural language processing applications. In: Proceedings of LREC

    Google Scholar 

  13. Stumme G (2002) Efficient data mining based on formal concept analysis. In: Proceedings of the DEXA ’02 proceedings of the 13th international conference on database and expert systems applications, pp 534–546

    Google Scholar 

  14. Wilks Y, Stevenson M (1998) The grammar of sense: using part-of-speech tags as a first step in semantic disambiguation. Nat Lang Eng 4:135–143

    Article  Google Scholar 

  15. Kuipers BJ (1984) Causal reasoning in medicine: analysis of a protocol. Cognit Sci 8:363–385

    Article  Google Scholar 

  16. Danks D, Griffiths TL, Tenenbaum JB (2003) Dynamical causal learning. In: Becker S, Thrun S, Obermayer K (eds) Advances in neural information processing systems 15. MIT Press, Cambridge, pp 67–74

    Google Scholar 

  17. Trovati M, Bessis N (2015) An influence assessment method based on co-occurrence for topologically reduced big data sets. Soft Comput 1432–7643, pp 1–10

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcello Trovati .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Trovati, M. (2015). Extraction of Bayesian Networks from Large Unstructured Datasets. In: Trovati, M., Hill, R., Anjum, A., Zhu, S., Liu, L. (eds) Big-Data Analytics and Cloud Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-25313-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25313-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25311-4

  • Online ISBN: 978-3-319-25313-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics