Browse Definitions:
Definition

# Bayesian logic

Named for Thomas Bayes, an English clergyman and mathematician, Bayesian logic is a branch of logic applied to decision making and inferential statistics that deals with probability inference: using the knowledge of prior events to predict future events. Bayes first proposed his theorem in his 1763 work (published two years after his death in 1761), An Essay Towards Solving a Problem in the Doctrine of Chances . Bayes' theorem provided, for the first time, a mathematical method that could be used to calculate, given occurrences in prior trials, the likelihood of a target occurrence in future trials. According to Bayesian logic, the only way to quantify a situation with an uncertain outcome is through determining its probability.

Bayes' Theorem is a means of quantifying uncertainty. Based on probability theory, the theorem defines a rule for refining an hypothesis by factoring in additional evidence and background information, and leads to a number representing the degree of probability that the hypothesis is true. To demonstrate an application of Bayes' Theorem, suppose that we have a covered basket that contains three balls, each of which may be green or red. In a blind test, we reach in and pull out a red ball. We return the ball to the basket and try again, again pulling out a red ball. Once more, we return the ball to the basket and pull a ball out - red again. We form a hypothesis that all the balls are all, in fact, red. Bayes' Theorem can be used to calculate the probability (p) that all the balls are red (an event labeled as "A") given (symbolized as "|") that all the selections have been red (an event labeled as "B"):

p(A|B) = p{A + B}/p{B}

Of all the possible combinations (RRR, RRG, RGG, GGG), the chance that all the balls are red is 1/4; in 1/8 of all possible outcomes, all the balls are red AND all the selections are red. Bayes' Theorem calculates the probability that all the balls in the basket are red, given that all the selections have been red as .5 (probabilities are expressed as numbers between 0. and 1., with "1." indicating 100% probability and "0." indicating zero probability).

The International Society for Bayesian Analysis (ISBA) was founded in 1992 with the purpose of promoting the application of Bayesian methods to problems in diverse industries and government, as well as throughout the Sciences. The modern incarnation of Bayesian logic has evolved beyond Bayes' initial theorem, developed further by the 18th century French theorist Pierre-Simon de Laplace, and 20th and 21st century practitioners such as Edwin Jaynes, Larry Bretthorst, and Tom Loredo. Current and possible applications of Bayesian logic include an almost infinite range of research areas, including genetics, astrophysics, psychology, sociology, artificial intelligence ( AI ), data mining , and computer programming .

This was last updated in January 2006

#### Join the conversation

Send me notifications when other members comment.
> defines a rule for refining an hypothesis by factoring in a

s/an/a
Cancel
You wrote: "Of all the possible combinations (RRR, RRG, RGG, GGG), the chance that all the balls are red is 1/4." Where does that come from? If the initial conditions were random, the chance that all three balls were red is 1/8; the chance that all three were green is 1/8; and the chance of two red and one green is 3/8 (RRG,RGR, GRR); and the chance of one red and 2 green is 3/8 (RGG,GRG,GGR).
Cancel
There seems to be more than one mistake here....
One factor is that a basket with only one color inside is not going to yield more one than one result.
Cancel
How would you like a way that with one-click you can get crazy profits?
http://tinyurl.com/oljawde
Cancel

## SearchCompliance

• ### risk map (risk heat map)

A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

• ### internal audit (IA)

An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

• ### pure risk (absolute risk)

Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

## SearchSecurity

• ### federated identity management (FIM)

Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

• ### cross-site scripting (XSS)

Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

• ### firewall

In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...

## SearchHealthIT

• ### 21st Century Cures Act

The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

• ### vendor neutral archive (VNA)

A vendor neutral archive (VNA) is a technology that stores medical images in a standard format and interface, making them ...

• ### HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009

The HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 is legislation that was created to ...

## SearchDisasterRecovery

• ### business continuity and disaster recovery (BCDR)

Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

• ### business continuity plan (BCP)

A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

• ### call tree

A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

## SearchStorage

• ### all-flash array (AFA)

An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

• ### volume manager

A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

• ### external storage device

An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...

## SearchSolidStateStorage

• ### hybrid hard disk drive (HDD)

A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close