{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T17:56:02Z","timestamp":1769882162133,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T00:00:00Z","timestamp":1687392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T00:00:00Z","timestamp":1687392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11227-023-05458-y","type":"journal-article","created":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T01:01:49Z","timestamp":1687482109000},"page":"75-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic"],"prefix":"10.1007","volume":"80","author":[{"given":"Chandan","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sudhanshu Kumar","family":"Jha","sequence":"additional","affiliation":[]},{"given":"Dilip Kumar","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Shiv","family":"Prakash","sequence":"additional","affiliation":[]},{"given":"Mukesh","family":"Prasad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,22]]},"reference":[{"issue":"1","key":"5458_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1049\/sfw2.12043","volume":"16","author":"LR Abraham de Sousa","year":"2022","unstructured":"Abraham de Sousa LR, de Souza CRB, Reis RQ (2022) A 20-year mapping of Bayesian belief networks in software project management. IET Softw 16(1):14\u201328","journal-title":"IET Softw"},{"key":"5458_CR2","doi-asserted-by":"crossref","unstructured":"Albert S, Alessandro P, Rosa Coletta V, Umberto F, Raffaele G (2021) Bayesian Belief networks for integrating scientific and stakeholders\u2019 knowledge to support nature-based solution implementation. Front Earth Sci 9","DOI":"10.3389\/feart.2021.674618"},{"issue":"1","key":"5458_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1214\/088342304000000189","volume":"19","author":"DR Bellhouse","year":"2004","unstructured":"Bellhouse DR (2004) The reverend Thomas Bayes, FRS: a biography to celebrate the tercentenary of his birth. Stat Sci 19(1):3\u201343","journal-title":"Stat Sci"},{"key":"5458_CR4","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/0004-3702(90)90060-D","volume":"42","author":"GF Cooper","year":"1990","unstructured":"Cooper GF (1990) The computational complexity of probabilistic inference using Bayesian belief networks. Artif Intell 42:393\u2013405","journal-title":"Artif Intell"},{"issue":"2","key":"5458_CR5","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1002\/int.10080","volume":"18","author":"FJ D\u00edez","year":"2003","unstructured":"D\u00edez FJ, Gal\u00e1n SF (2003) Efficient computation for the noisy MAX. Int J Intell Syst 18(2):165\u2013177","journal-title":"Int J Intell Syst"},{"issue":"5","key":"5458_CR6","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/32.815326","volume":"25","author":"NE Fenton","year":"1999","unstructured":"Fenton NE, Neil M (1999) A critique of software defect prediction models. IEEE Trans Softw Eng 25(5):675\u2013689","journal-title":"IEEE Trans Softw Eng"},{"issue":"10","key":"5458_CR7","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1109\/TKDE.2007.1073","volume":"19","author":"NE Fenton","year":"2007","unstructured":"Fenton NE, Neil M, Caballero JG (2007) Using ranked nodes to model qualitative judgments in Bayesian networks. IEEE Trans Knowl Data Eng 19(10):1420\u20131432","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"5","key":"5458_CR8","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10664-008-9072-x","volume":"13","author":"N Fenton","year":"2008","unstructured":"Fenton N, Neil M, Marsh W, Hearty P, Radli\u0144ski \u0141, Krause P (2008) On the effectiveness of early life cycle defect prediction with Bayesian Nets. Empir Softw Eng 13(5):499\u2013537","journal-title":"Empir Softw Eng"},{"key":"5458_CR9","unstructured":"Huang K, Henrion M (2013) Efficient search-based inference for noisy-OR belief networks: TopEpsilon.\u00a0arXiv preprint arXiv:1302.3584"},{"key":"5458_CR10","doi-asserted-by":"crossref","unstructured":"Kaya M, Alhajj R (2003) A clustering algorithm with genetically optimized membership functions for fuzzy association rules mining. In: The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ'03, vol 2. IEEE, pp 881\u2013886","DOI":"10.1109\/FUZZ.2003.1206547"},{"key":"5458_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.ress.2019.02.001","volume":"186","author":"T Kayu","year":"2019","unstructured":"Kayu T, David JP, Simon J (2019) Comparison of automatic and guided learning for Bayesian networks to analyse pipe failures in the water distribution system. Reliab Eng Syst Saf 186:24\u201336","journal-title":"Reliab Eng Syst Saf"},{"key":"5458_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/9780470684023","volume-title":"Bayesian networks an introduction","author":"T Koski","year":"2009","unstructured":"Koski T, Noble JM (2009) Bayesian networks an introduction. Wiley, UK"},{"key":"5458_CR13","doi-asserted-by":"crossref","unstructured":"Kumar C, Yadav DK (2015) A method for developing node probability table using qualitative value of software metrics. In: Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT). IEEE, pp 1\u20135","DOI":"10.1109\/C3IT.2015.7060187"},{"issue":"4","key":"5458_CR14","doi-asserted-by":"publisher","first-page":"2109","DOI":"10.1007\/s13198-014-0326-2","volume":"8","author":"C Kumar","year":"2017","unstructured":"Kumar C, Yadav DK (2017) Software defects estimation using metrics of early phases of software development life cycle. Int J Syst Assur Eng Manag 8(4):2109\u20132117","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"7","key":"5458_CR15","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.1109\/TKDE.2016.2535229","volume":"28","author":"P Laitila","year":"2016","unstructured":"Laitila P, Virtanen K (2016) Improving construction of conditional probability tables for ranked nodes in Bayesian networks. IEEE Trans Knowl Data Eng 28(7):1691\u20131705","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"5458_CR16","doi-asserted-by":"crossref","unstructured":"Laitila P, Virtanen K (2022) Advancing construction of conditional probability tables of Bayesian networks with ranked nodes method. Int J Gen Syst 1\u201333","DOI":"10.1080\/03081079.2022.2086541"},{"issue":"6","key":"5458_CR17","doi-asserted-by":"publisher","first-page":"2252","DOI":"10.1109\/TSMCB.2004.834424","volume":"34","author":"JF Lemmer","year":"2004","unstructured":"Lemmer JF, Gossink DE (2004) Recursive noisy OR-a rule for estimating complex probabilistic interactions. IEEE Trans Syst Man Cybern Part B (Cybern) 34(6):2252\u20132261","journal-title":"IEEE Trans Syst Man Cybern Part B (Cybern)"},{"key":"5458_CR18","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s13198-011-0078-1","volume":"2","author":"S Mohanta","year":"2011","unstructured":"Mohanta S, Vinod G, Ghosh AK, Mall R (2011) A technique for early prediction of software reliability based on design metrics. Int J Syst Assur Eng Manag 2:261\u2013281","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"2","key":"5458_CR19","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/S0167-9236(03)00095-2","volume":"38","author":"S Nadkarni","year":"2004","unstructured":"Nadkarni S, Shenoy PP (2004) A causal mapping approach to constructing Bayesian networks. Decis Support Syst 38(2):259\u2013281","journal-title":"Decis Support Syst"},{"key":"5458_CR20","unstructured":"Neapolitan RE (2004) Learning Bayesian networks. Pearson Prentice Hall, Upper Saddle River"},{"key":"5458_CR21","unstructured":"Netica (2010) Available at http:\/\/www.norsys.com"},{"key":"5458_CR22","doi-asserted-by":"crossref","unstructured":"O\u2019Hagan A, Buck CE, Daneshkhah A, Eiser JR, Arthwaite PH, Jenkinson GDJ, Oakley JE, Rakow T (2006) Uncertain judgements: eliciting experts\u2019 probabilities. Wiley","DOI":"10.1002\/0470033312"},{"issue":"1","key":"5458_CR23","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/s10664-012-9218-8","volume":"19","author":"A Okutan","year":"2014","unstructured":"Okutan A, Y\u0131ld\u0131z OT (2014) Software defect prediction using Bayesian networks. Empir Softw Eng 19(1):154\u2013181","journal-title":"Empir Softw Eng"},{"issue":"10","key":"5458_CR24","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TSE.2007.70722","volume":"33","author":"GJ Pai","year":"2007","unstructured":"Pai GJ, Dugan JB (2007) Empirical analysis of software fault content and fault proneness using Bayesian methods. IEEE Trans Softw Eng 33(10):675\u2013686","journal-title":"IEEE Trans Softw Eng"},{"key":"5458_CR25","doi-asserted-by":"crossref","unstructured":"Pearl J (1988)\u00a0Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan kaufmann","DOI":"10.1016\/B978-0-08-051489-5.50008-4"},{"key":"5458_CR26","doi-asserted-by":"crossref","unstructured":"Perkusich M, Perkusich A, de Almeida HO (2013) Using survey and weighted functions to generate node probability tables for Bayesian networks. In: 2013 BRICS Congress on Computational Intelligence and 11th Brazilian Congress on Computational Intelligence. IEEE, pp 183\u2013188","DOI":"10.1109\/BRICS-CCI-CBIC.2013.39"},{"key":"5458_CR27","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.ijar.2021.09.013","volume":"139","author":"DA Quintanar-Gago","year":"2021","unstructured":"Quintanar-Gago DA, Nelson PF (2021) The extended recursive noisy OR model: static and dynamic considerations. Int J Approx Reason 139:185\u2013200","journal-title":"Int J Approx Reason"},{"key":"5458_CR28","volume-title":"Fuzzy logic with engineering applications","author":"TJ Ross","year":"2009","unstructured":"Ross TJ (2009) Fuzzy logic with engineering applications. Wiley"},{"issue":"7","key":"5458_CR29","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.ijar.2011.01.008","volume":"52","author":"E Santos Jr","year":"2011","unstructured":"Santos E Jr, Wilkinson JT, Santos EE (2011) Fusing multiple Bayesian knowledge sources. Int J Approx Reason 52(7):935\u2013947","journal-title":"Int J Approx Reason"},{"key":"5458_CR30","doi-asserted-by":"crossref","unstructured":"Tang Z, McCabe BY (2007) Developing complete conditional probability tables from fractional data for Bayesian belief networks. ASCE","DOI":"10.1061\/(ASCE)0887-3801(2007)21:4(265)"},{"issue":"4","key":"5458_CR31","doi-asserted-by":"publisher","first-page":"2097","DOI":"10.1007\/s13198-014-0325-3","volume":"8","author":"HB Yadav","year":"2017","unstructured":"Yadav HB, Yadav DK (2017) Early software reliability analysis using reliability relevant software metrics. Int J Syst Assur Eng Manag 8(4):2097\u20132108","journal-title":"Int J Syst Assur Eng Manag"},{"key":"5458_CR32","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.dss.2012.11.001","volume":"56","author":"H Yong","year":"2013","unstructured":"Yong H, Xiangzhou Z, Ngai EWT, Ruichu C, Mei L (2013) Software project risk analysis using Bayesian networks with causality constraints. Decis Support Syst 56:439\u2013449","journal-title":"Decis Support Syst"},{"key":"5458_CR33","doi-asserted-by":"crossref","unstructured":"Zadeh LA (1996) Knowledge representation in fuzzy logic. In: Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems: Selected Papers by Lotfi a Zadeh, pp 764\u2013774","DOI":"10.1142\/9789814261302_0039"},{"key":"5458_CR34","unstructured":"Zagorecki A, Druzdzel MJ (2004) An empirical study of probability elicitation under noisy-OR assumption. In: Flairs Conference, pp 880\u2013886"},{"issue":"5","key":"5458_CR35","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.1016\/j.ijar.2014.02.008","volume":"55","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Fenton N, Neil M (2014) Bayesian network approach to multinomial parameter learning using data and expert judgments. Int J Approx Reason 55(5):1252\u20131268","journal-title":"Int J Approx Reason"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05458-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05458-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05458-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T11:19:00Z","timestamp":1704712740000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05458-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,22]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5458"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05458-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,22]]},"assertion":[{"value":"29 May 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest for the article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors reviewed the manuscript.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"There is no informed consent for the article.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}