Professional Documents
Culture Documents
art ic l e i nf o
Keywords:
Bayesian Belief Networks
Human Reliability Analysis
Expert judgment
Conditional Probability Tables
a b s t r a c t
The present paper evaluates ve methods for building Conditional Probability Tables (CPTs) of Bayesian
Belief Networks (BBNs) from partial expert information: functional interpolation, the Elicitation BBN, the
Cain calculator, Fenton et al. and Red et al. methods. The evaluation considers application to a specic
eld of risk analysis, Human Reliability Analysis (HRA). The ve methods are particularly suited for HRA
models calculating the human error probability as a function of inuencing factor assessments. The
performance of the methods is evaluated on two simple examples, designed to test aspects relevant for
HRA (but not exclusively): the representation of strong factor inuences and interactions, the representation of uncertainty on the BBN relationships, and the method requirements as the BBN size
increases. The evaluation underscores modelling limitations related to the treatment of multi-factor
interdependencies and of different degrees of uncertainty in the factor relationships. The functional
interpolation method is the least susceptible to these limitations; however, its elicitation requirements
grow exponentially with the model size. Besides expert judgment, HRA applications of BBNs include the
use of empirical data, combination of data and judgment, information from existing HRA methods: the
building of the CPTs in these applications is outside the scope of the evaluation.
& 2016 Elsevier Ltd. All rights reserved.
1. Introduction
Bayesian Belief Networks (BBNs) are increasingly being used in
risk analysis applications to model the effect of multiple, diverse,
inter-related inuences on risk. Their ability to incorporate diverse
types of factors has allowed the construction of comprehensive
models for risk assessment including hardware, human, and
organizational failures, as well as diverse risk-conditioning events,
as in [13]. Risk analysis applications, dealing with rare events,
often have to cope with the scarcity of data available to understand the complex interactions leading to failure events: in these
applications, BBNs have proven useful to formalize, represent, and
quantify subjective knowledge on uncertain events. At the other
extreme, in data-rich applications (e.g. some medical diagnosis
and nancial applications), BBNs are typically used for data mining
to make sense of causal or inuencing relationships and build
predictive models learnt from data [4]. Other applications fall
between these categories and BBNs are generally developed by
combining available data and expert judgment.
n
http://dx.doi.org/10.1016/j.ress.2016.01.004
0951-8320/& 2016 Elsevier Ltd. All rights reserved.
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
Fig. 1 shows a BBN example with two child nodes (D and E) and
three parent nodes (A, B, C). In their most typical representation,
BBN nodes are associated with mutually exclusive discrete states
(with reference to Fig. 1: a1, a2 are the states of node A; b1, b2 are
the states of node B; ; e1, e2 are the states of node E). Such
discrete nodes are generally preferred because the associated
calculation scheme is simpler compared to that for continuous
nodes; nevertheless, the adoption of continuous nodes is advisable
(or even necessary) for some applications [33]. Fig. 1 shows an
example of BBN with binary states, but multi-state nodes are also
frequently used. For BBNs with discrete state nodes, the BBN
relationships are in the form of Conditional Probability Distributions (CPDs); each child state requires a CPD for each possible
combination of its parents' states (Table 1 gives an example of the
CPDs for node E).
The BBN formalism allows visualizing and quantifying properties of the joint probability distribution of A, B, C, D, E. In particular,
for the most typical HRA applications, nodes A, B, C would model
observable PSFs; node D would model an error context or error
mechanism (possibly not observable); node E would model the
occurrence of the human error. The estimation of a probability of
human error, given a particular conguration of the factor states is
the primary interest in most HRA applications. Alternatively, the
BBN may be used to infer knowledge on the factor states given
that an error has been observed (i.e. to infer what is likely to have
inuenced the occurrence of the error). The former use of BBN is
often referred to as predictive, while the latter as diagnostic.
Data-rich applications such as medical diagnosis and nancial
applications typically rely on data to build CPTs by learning algorithms. Depending on the amount and quality of the available data,
the algorithms are based on the maximum likelihood estimator,
Bayesian estimator and more sophisticated procedures to cope
with realistic data sets with missing, incorrect, sparse entries
(refer to [4] and [5] for a comprehensive treatment). For rare-event
applications, BBNs are typically constructed based on input from
expert domain. In this phase, the typical tools are questionnaires,
interviews and panel discussions. The issues to deal with are
typical of applications in which a large number of probabilities are
elicited from experts, e.g., avoiding different types of biases,
ensure consistency in the assessments [8,9].
The development of lling-up methods, or more in general,
methods to determine CPDs from limited information is an
important subject of research for BBNs, motivated either because
of the difculty to collect statistically signicant data covering all
BBN relationships, or because the elicitation of an excessive
number of probabilities may become impractical and prone to
inconsistencies. The methods to build BBNs from limited data and
judgment information are fundamentally different. The former are
often based on Bayesian update, with prior knowledge either from
aggregated data or from expert judgment [5]. The latter are based
on eliciting specic information from experts, for example selected
Table 1
CPT for node E of the BBN in Fig. 1.
A
A a1
D d1
D d2
D d1
D d2
E e1
E e2
0.1
0.9
0.4
0.6
0.3
0.7
0.8
0.2
A a2
CPDs and/or factor importance weights and then build the CPTs.
The fundamental difference is that in general for the former case
one has to make the best use of the data available, with limited
possibility to drive the data to satisfy specic information needs.
On the other hand, the latter methods aim at focussing the elicitation on specic information, to efciently develop the
overall model.
The majority of lling-up methods have been developed for
BBNs with binary nodes. The general idea of these methods is to
associate operators linking the state of the parent and child nodes,
the mostly used being: Boolean operators (typically, OR, AND,
M-out-of-N) [10], weighted averages [10], and Noisy-OR gates
[4,10,11]. Boolean operators and weighted averages represent
deterministic relationships between parent and child nodes: the
uncertainty in the outcome (child state) depends on the uncertainty in the presence of the inuencing factor, but not in its effect.
This is a strong modelling constraint for many applications in
which factors have non-deterministic and/or uncertain relationships. The most widely used method is the Noisy-OR model, proposed in [11]. In the Noisy-OR model, the probability of the outcome is the product of the probabilities of the outcome in presence of one factor at a time, with all other factors being absent. In
this model, the factor inuence on the outcome is independent on
the presence of the other factors. A number of extensions of the
Noisy-Or model have been developed, generally addressing either
dependent inuences or multi-state nodes [12].
Another type of CPT building methods uses interpolation
methods [1315]. These methods are typically based on extracting
information on the factor effects from known relationships
(anchor CPDs) and extrapolating to the whole CPTs. In the functional interpolation method [14], CPDs elicited at the anchor
positions are approximated by functions (e.g., Normal functions),
described by parameters; the parameters of the missing CPDs are
obtained by interpolating those corresponding to the anchor ones.
The EBBN method [13] is based on piecewise linear functions
interpolating among the elicited CPDs, and on state inuencing
factors and importance weights. The Cain calculator uses interpolation factors derived from CPDs at the anchors to populate the
missing relationships in CPTs [15].
Another well-established method, not based on interpolation
of known CPDs is the one from Fenton et al. [16], implemented
within the AgenaRisk software [38]. According to this method, the
CPTs are derived from weighted functions of the inuencing factors. The functions (truncated normal) and the weights are
determined from qualitative statements (most often, but quantitative analysis may be of support) on the general tendency of the
inuencing factor effect. The method presented by Red et al. [2] is
also based on functional relationships between inuencing factors
and outcome nodes; here, the parameters of the function (exponential) are determined based on the elicitation of selected CPDs.
It is worth noting that, given the fast increase in the number of
CPDs with the size of the BBN, an effective way to reduce the CPD
quantication requirements (from data, expert judgment, and
combinations of both) is to act on the BBN structure. Indeed, for
data-rich applications, structure-learning algorithms generally
automatically search for the BBN structure that optimizes some
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
States
HumanMachine Interface
Task complexity
Time pressure
Fig. 3. The two example BBNs: BBN 1 (left) and BBN 2 (right).
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
Fig. 4. Assumed expert judgment knowledge base: most likely child state at
anchors (BBN 1).
(Fig. 5). Again, the inuence of HMI being in the Error forcing state
while the other two factors TC and TP being in the Very low state
(anchor 2) is larger than that of either of TC or TP factors being in the
Very high state while factor HMI being in the Strongly success
forcing state (anchor 3 and 5): indeed, the resulting HEP for anchor
2 is High while for anchors 3 and 5 are Medium. In a similar way
as in BBN 1, when HMI is in its Error forcing state, the HEP is
High, independently on the state of the other two factors. The two
single-factor aspects Difference importance of factors and Dominance of one factor in one state in Table 3 are analysed for BBN 2 as
well. The knowledge base of BBN 2 has been dened such to model
another typical situation for HRA: the interaction of multiple factors
(two in this case), evaluation aspect Combined error-forcing effect
of Table 3. In particular, the HEP is assessed as High in case both
factors TC and TP are in their mostly error-forcing state, while the
HMI factor is strongly success-forcing (anchor 7). The two factors
interact in the sense that their combined effect is larger than when
they act alone (in which case the HEP state would be Medium, as
in anchors 3 and 5).
Two cases are considered for each example, each associated with
the same qualitative statements from Figs. 4 and 5, but with different degrees of uncertainty associated to the parent node inuence (evaluation criterion 2, Table 3). Fig. 6 shows the assumed
expert knowledge base for the two BBN 1 cases: no uncertainty,
NOUNC case on the left; uncertainty, UNC case on the right. The
knowledge base has been assumed such that anchor 3 has the largest uncertainty in the HEP state distribution (Fig. 6). The features of
the two cases for BBN 2 are similar: see the result gures for the
CPDs associated to the knowledge base Figs. 11 and 12 subplot (a),
dark blue bars, for NOUNC and UNC cases, respectively).
For evaluation criterion 3, the increase in the number of parameters to be elicited in BBN 2, respect to BBN 1 is considered. The
interest for this criterion is to extrapolate the trend (linear,
exponential) of the increasing requirement for the application the
methods.
Finally, as mentioned, each method requires a different set of
anchor relationships to build the BBN model. For example, the
EBBN method [13], the Cain calculator [15], and the functional
interpolation method [14] build the BBN models from elicited
CPDs of selected parent congurations (although the methods
differ in terms of which parent congurations are selected). In
contrast, Fenton et al. method [16] requires the denition of an
inuence function and the assessment of a number of shape
parameters. Tables 4 and 5 show the positions of the anchors
required by the methods for BBN 1 and BBN 2, respectively (Fenton
et al. method does not require a dened set of anchors).
In the denition of the anchor positions, it was decided to match
the requirement of [14], because the latter involves the lowest
number of anchors for BBN 1 (Table 4). In case one method requires
information beyond the basis of Figs. 3 and 5, the CPDs produced by
the method in [14] are used as the basis for this information. An
alternative approach could have been to introduce additional judgments to the base of Figs. 3 and 5 to satisfy each method requirements. The former approach was preferred to avoid that the
Fig. 5. Assumed expert judgment knowledge base: most likely child state at anchors (BBN 2).
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
Table 3
CPT building methods evaluation criteria.
Description
Criteria 1 Factor inuences and
interactions
Criteria 2 Representation of
uncertainty
HEP takes different values if factors are one at a time in their EF state (e.g. BBN 1 case
NOUNC: HEP high if HMI EF and TC VL; HEP Medium if HMI SSF and TC VH)
Dominance of one factor in one
HEP is peaked on high if HMI EF, independently on the state of the other factors (BBN
state
1 and BBN 2 in NOUNC and UNC cases)
Combined error-forcing effect
In BBN 2 (NOUNC and UNC cases):
HEP High if TC VH, TP VH, HMI SSF
Different uncertainty in the
BBN 1, case UNC: uncertainty in HEP state for HMI SSF and TC VH larger than other
relationships
anchors
BBN 2, case UNC: uncertainty in HEP state for HMI SSF, TC VH, TP VL (anchor 3) and
HMI SSF, TC VH, TP VH (anchor 7) larger than other anchors
Increase in elicitation burden with BBN 2 larger than BBN 1 by one node
BBN size increase
Note: The implementation of the HRA aspects in the knowledge base aims at testing the methods: it does not represent any cognitive model or HRA method in particular.
Fig. 6. Assumed expert judgment knowledge base: CPDs for the parent congurations selected as anchors for BBN 1; NOUNC case, on the left; UNC case, on the right.
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
Table 5
Position of the elicited anchors, BBN 2, NOUNC and UNC cases.
(1). In UNC case (Table 8, right), the values of the parameter reect
the different uncertainty in the anchor CPDs, with anchor 3
({HMISSF, TCVH}, bottom left) being associated the largest
uncertainty.
The full sets of CPDs for the two cases are plotted in Figs. 7 and 8
where the dark blue bars correspond to anchor CPDs and the light
blue bars are generated (Figs. 7 and 8 show the results of all lling-up
methods, to favour the comparison). In both NOUNC and UNC cases,
the produced CPDs reect the higher inuence on the HEP of factor
HMI than of factor TC, which was featured into the expert judgment
knowledge base in Fig. 6. Indeed, in both Figs. 7 and 8 subplot (a), if
HMI is in its EF state (last column), the CPD does not depend on the TC
state and replicates the anchor CPD. Concerning the rest of the CPDs,
for the NOUNC case, Fig. 7 subplot (a) shows that the CPDs are either
highly peaked on one HEP state, or, in practice, equally split on two
states. In this case of no uncertainty, the shape of the CPD results from
a narrow Normal function, determined by the values of the two
parameters and (the latter being constant and small, Table 7): if
is such that the Normal function is contained into one bar (e.g. in case
1.67 or 2.33), the highly peaked CPDs are produced; if is right inbetween two HEP states (e.g. in case 1.5 or 2.5) the equally split
CPDs are produced. Indeed, in the NOUNC case, with no uncertainty in
the anchor CPDs, the uncertainty in the derived CPDs reects the
degree of belief in which HEP state the output variable is associated
with, rather than on the value of the output variable itself (which, for
example, in case of HMI SSF and TCNom, is narrowly peaked
on 1.5).
Moving to consider the UNC case, Fig. 8 subplot (a) shows that the
uncertainty in the anchor CPDs results in larger uncertainty reected
in the produced CPDs. In Fig. 8 the CPD shapes are determined by the
progressive shift of both parameters and . In particular, concerning
, the CPDs progressively atten as they approach anchor 3. Indeed,
in this UNC case, the uncertainty in the derived CPDs reects both the
degree of belief in which HEP state the output variable is associated
with, as well as the value of the output variable itself.
4.2. EBBN method
4.2.1. Summary description of the EBBN method [13]
This method is based on piecewise linear functions interpolating among the CPDs elicited at the anchors. The functions
relate the probability of each child node state to an inuence
factor, which is used to characterize the strength of inuence of a
particular parent conguration. The CPDs for a specic parent
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
Table 6
Summary of steps for each method (texts in italic identies the steps requiring expert elicitation; steps in normal font are performed by the algorithms underlying the methods).
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
10
Table 8
Parameters of the CPD approximating functions (mean and standard deviation): anchor assessment on shaded cells; interpolated values
on white cells (BBN 1, UNC case).
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
11
Fig. 7. The CPDs for BBN 1, NOUNC case. (a) The functional interpolation method. (b) EBBN method. (c) Cain calculator. (d) Fenton et al. method. (e1) Red et al. method (all
CPDs generated by the Red et al. method). (e2) Red et al. method (anchors from the functional interpolation method). (For interpretation of the references to color in this
gure, the reader is referred to the web version of this article.)
omitted. The factors are calculated for the two extreme states of the
child node Low and High, for the present case). Thus, in total,
BBN 1 requires four interpolation factors: two (one for each extreme
state of the child) for the two consecutive increments of the parent
node states (Low to Nom and Nom to High).
The idea for lling the CPT is to progressively determine the
CPDs of the parent congurations that differ by one state of one
parent node from one conguration with known CPD. Starting
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
12
Fig. 8. The CPDs for BBN 1, UNC case. (a) The functional interpolation method. (b) EBBN method. (c) Cain calculator. (d) Fenton et al. method. (e1) Red et al. method (all
CPDs generated by the Red et al. method). (e2) Red et al. method ( anchors from the functional interpolation). (For interpretation of the references to color in this gure,
the reader is referred to the web version of this article.)
from the anchor congurations, the set of known CPDs progressively increases until all CPDs are populated. To derive a missing
CPD from a known CPD (differing by one state of one parent node),
the interpolation factors are used to determine the proportion of
change in the probability of the child states.
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
13
Fig. 9. The piecewise linear functions for CPDs for the BBN 1 case NOUNC (left) and UNC (right).
Therefore, the CPD values for HEP HIGH in each column of Fig. 7
subplot (c), which are derived with the method, are the same as
those values for corresponding anchors in the column. This means
column wise in Fig. 7 subplot (c) the CPDs for HEP HIGH state
will be the same. Consequently, when HMI is error forcing the
CPDs will be skewed towards high HEPs independently of complexity change, which reects the knowledge base of this example.
The interpolation factor for HEP LOW when complexity changes
from nominal to high is equal to 0, which means that independently of base congurations each time complexity is changing
from nominal to high, the CPD value for HEP LOW is the same as
the one for the worst case scenario (anchor 4 in Fig. 4) in which
normally the belief on HEP LOW is either 0 or close to 0.
Therefore, the belief on HEP LOW in CPDs of the last row Fig. 7
subplot (c) will replicate the values of low HEPs of anchor 4 in
Fig. 4.
For BBN 1 UNC case also the CPDs corresponding to HMI EF
reect the knowledge base in that the error forcing HMI leads to
high HEPs, independently of the task complexity (Fig. 8(c), last
column). This is again because the interpolation factor for switch
of TC node from very low to nominal when HEP HIGH is very
close to one (0.954). Therefore, in practice, the CPD of {HMIEF,
TC Nom} replicates that of anchor 2. The effect of uncertainty
results in the interpolation factors for TC node state increment
from NOMINAL to VH (Table 9: 1 vs. 0.734 for HEP HIGH and 0 vs.
0.271 for HEP LOW). Generally, as expected, the effect is the
larger uncertainties in CPDs of Fig. 8 compared to Fig. 7.
Table 9
Application of the Cain calculator to BBN 1: interpolation factors for NOUNC and
UNC cases, TC node.
IFTC
VL-Nom
(HEP HIGH)
NOUNC 1.000
UNC
0.954
Nom-VH
(HEP HIGH)
VL-Nom
(HEP LOW)
Nom-VH
(HEP LOW)
1.000
0.736
0.500
0.499
0.000
0.271
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
14
Fig. 10. Example of CPD calculation with the EBBN method; HMI EF, TC Nominal, BBN 1 NOUNC case.
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
15
Fig. 11. The CPTs generated with all ve methods for BBN 2, NOUNC case. (a) The functional interpolation method. (b) EBBN method. (c) Cain calculator. (d) Fenton et al.
method. (e) Red et al. method (all generated CPDs). (For interpretation of the references to color in this gure, the reader is referred to the web version of this article.)
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
16
Fig. 12. The CPTs generated with all ve methods for BBN 2, UNC case. (a) The functional interpolation method. (b) EBBN method. (c) Cain calculator. (d) Fenton et al.
method. (e) Red et al. method (anchors from the functional interpolation method). (For interpretation of the references to color in this gure, the reader is referred to the
web version of this article.)
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
IFTC
NOUNC
UNC
IFTP
NOUNC
UNC
VL-Nom
(HEP High)
Nom-VH
(HEP High)
VL-Nom
(HEP Low)
Nom-VH
(HEP Low)
1.000
0.954
1.000
0.736
0.500
0.499
0.000
0.271
1.000
0.999
1.000
0.959
0.500
0.521
0.000
0.042
17
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
18
Table 11
Summary evaluation of the CPT building methods.
Criteria #
Description
Functional int.
EBBN
Cain
Fenton et al.
Red et al.
Representation of uncertainty
Elicitation burden
Exponential
2
3
Linear
Linear
when the other two nodes are in their SF states (see conguration
{HMIEF, TC VL, TP VL} in Fig. 11(d)). The deviation from the
knowledge base of the produced CPDs is even stronger when
adopting the Red et al. method (see for example the CPD for
conguration {HMIEF, TC VL, TP VL} in Fig. 11(e) has a maximum on HEP Low). In particular, as presented in Section 4.6 for
NOUNC case the three nodes are assigned very similar weights and
therefore do not differentiate in the factor importance. The value
of the weights is determined by the selected anchor CPDs, which
in the case of the Red et al. method result in very similar
expected values for the two congurations used to calculate the
weights (see the CPDs for {HMI SSF, TC Nom, TP Nom} vs.
{HMIEF, TC Nom, TP Nom}, {HMI Nom, TC VL, TP Nom}
vs. {HMINom, TC VH, TP Nom}, and {HMI Nom, TCNom,
TP VL} vs. {HMINom, TC Nom, TP VH}.
The third evaluation aspect relates to the interaction of the two
factors TC and TP when in their Very high state, while the HMI
factor is strongly success-forcing (Anchor 7 of the knowledge base,
i.e. conguration {HMISSF; TC VH; TP VH}). In this case, the
methods give remarkably different results (Figs. 11 and 12: relevant
plots are those corresponding to {HMISSF; TCVH; TP VH}). The
knowledge base of Fig. 5 represents the strong belief in the HEP node
state High, resulting from the combined effect of the two TC and TP
nodes being both in highest states. Only the functional approximation [14] and the Red et al. methods reproduce this belief, while all
other methods produce CPDs peaked on the Medium state. The
Red et al. method does not produce dominant weights, therefore
any of two parents being in the error forcing states will lead to HEPs
peaked on the high state (however, note that for the Red et al.
method this effect is not well reproduced in the BBN 2 UNC case
(Fig. 12). In general, anchor 7 is directly used only by the functional
approximation method. The EBBN method and Cain calculator build
on anchor CPDs obtained by varying the state of one node at a time.
The result is that the methods are challenged when the effect of
multiple nodes acting simultaneously is very different from when
they act alone. Concerning Fenton et al. method, the CPD for anchor
7 results from two opposing effects. On the one hand, the use of the
Weighted Maximum function favours high values of the child node
in presence of high values of one or more parent nodes. On the other
hand, the state Strongly success-forcing of the most important
node HMI tends to favour low values of the child state. Similar to
BBN 1 UNC case, different expressions could be used in the Fenton
et al. method to model different inuences of the parent states based
on their states. However, the method is easily applicable if the same
functional relationship is used for all parent combinations of a child
node. If different relationships are used to accommodate known
effects in specic combinations, then guidance is missing on which
relationships to use for the combinations where enough information
is not available. For modelling PSF relationships, the functional
approximation method appears to be the most exible. This may not
be surprising because, in its conceptual formulation, it uses information on single parameter effects and on all factor interactions (all
pairs, triplets, and so forth).
The second criterion deals with the treatment of uncertainty.
Fig. 12 shows the performance of the methods for BBN 2 UNC case,
characterized by larger uncertainty in the CPDs associated to
Linear
Linear
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
19
the child node. For each additional state of the child node, the
EBBN method requires an additional anchor evaluation. For
example, if for BBN 1 the HEP child node would be associated with
a set of ve states {VERY LOW, LOW, MEDIUM, HIGH, VERY HIGH}
then with respect to BBN 1 two additional elicitations are necessary which correspond to congurations giving the largest probability to the additional states.
6. Conclusions
References
[1] Francis RA, Guikema SD, Henneman L. Bayesian Belief Networks for predicting
drinking water distribution system pipe breaks. Reliab Eng Syst Saf
2014;130:111.
[2] Red W, Mosleh A, Vinnem JE, Aven T. On the use of the hybrid causal logic
method in offshore risk analysis. Reliab Eng Syst Saf 2009;94(2):44555.
[3] Groth K, Wang C, Mosleh A. Hybrid causal methodology and software platform
for probabilistic risk assessment and safety monitoring of socio-technical
systems. Reliab Eng Syst Saf 2010;95(12):127685.
[4] Jensen FV, Nielsen TD, Bayesian. Network and decision graphs. New York, NY,
USA: Springer science; 2007.
[5] Druzdzel MJ, van der Gaag L. Building Probabilistic Networks: where do the
numbers come from? IEEE Trans Knowl Data Eng 2000;12(4):4816.
[6] Fenton N, Neil M, Lagnado DA. A general structure for legal arguments about
evidence using Bayesian networks. Cognit Sci 2013;37(1):61102.
[7] Mkrtchyan L, Podollini L, Dang VN. Bayesian belief Networks for Human
reliability analysis: a review of applications and gaps. Reliab Eng Syst Saf
2015;139:116.
[8] Cooke RM. Experts in uncertainty. New York: Oxford university press; 1991.
[9] Pearl J. Fusion, propagation, and structuring in belief networks. Artif Intell
1986;29(3):24188.
[10] Fenton NE, Neil MD. Risk assessment and decision analysis with Bayesian
networks. Boca Raton, Florida, US: CRC Press; 2013.
[11] Pearl J. Probabilistic reasoning in intelligent systems: networks of plausible
inference. San Francisco, CA, US: Morgan Kaufmann; 1988.
[12] Xiang Y, Jia N. Modeling causal reinforcement and undermining for efcient
cpt elicitation. IEEE Trans Knowl Data Eng 2007;19(12):170818.
[13] Wisse BW, van Gosliga SP, van Elst NP, Barros AI. Relieving the elicitation
burden of bayesian belief networks. In: Proceedings of the sixth Bayesian
modelling applications workshop on UAI. Helsinki, Finland; 2008.
[14] Podollini L, Mkrtchyan L, Dang VN. Aggregating expert-elicited error probabilities to build HRA models. In: Proceedings of ESREL 2014. Sept. 1418,
Wroclaw, Poland; 2014. p. 108391.
[15] Cain J. Planning improvements in natural resource management. Guidelines
for using Bayesian networks to support the planning and management of
development programmes in the water sector and beyond. Wallingford, UK:
Centre for Ecology and Hydrology, Gromwarsh Gifford; 2001.
[16] Fenton NE, Neil M, Caballero JG. Using ranked nodes to model qualitative
judgments in Bayesian networks. IEEE Trans Knowl Data Eng 2007;
19(10):142032.
[17] Groth KM, Mosleh A. Deriving causal Bayesian networks from human reliability analysis data: a methodology and example mode. Proc Inst Mech Eng
Part O: J Risk Reliab 2012;226(4):36179.
[18] Gertman D, Blackman H, Byers J, Haney L, Smith C, Marble J. The SPAR-H
method. NUREG/CR-6883:US Nuclear Regulatory Commission; 2005.
[19] Williams JC. HEART a proposed method for assessing and reducing human
error. In: Proceedings of the 9th advances in reliability technology symposium.
University of Bradford; 1986.
[20] Hollnagel E. Cognitive reliability and error analysis method: CREAM. New
York: Elsevier; 1998.
[21] Chang YJ, Bley D, Criscione L, Kirwan B, Mosleh A, Madary T, Nowell R,
Richards R, Roth EM, Sieben S, Zoulis A. The SACADA database for human
reliability and human performance. Reliab Eng Syst Saf 2014;125:11733.
[22] Prvakova S, Dang VN. A review of the current status of HRA data. In: Proceedings of European safety and reliability conference (ESREL 2013). September 29October 2, Amsterdam, The Netherlands; 2013.
[23] Hallbert B, Morgan T, Hugo J, Oxstrand J, Persensky JJ. A formalized approach
for the collection of HRA data from nuclear power plant simulators. NUREG/
CR-7163, INL/EXT-12-26327 U.S. NRC Wash. D.C.; 2014.
[24] Shirley R, Smidts BC, Li M, Gupta A. Validating THERP: assessing the scope of a
full-scale validation of the technique for human error rate prediction. Ann
Nucl Energy 2015;77:194211.
[25] Preischl W, Hellmich M. Human error probabilities from operational experience of German nuclear power plants. Reliab Eng Syst Saf 2013;109:1509.
[26] Preischl W, Hellmich M. Human error probabilities from operational experience of German nuclear power plants, Part II. Reliab Eng Syst Saf
2016;148:4456.
[27] Liao H, Groth K, Stevens-Adams S. Challenges in leveraging existing human
performance data for quantifying the IDHEAS HRA method. Reliab Eng Syst Saf
2015;144:15969.
[28] Sundarmurthi R, Smidts C. Human reliability modelling for next generation
system code. Ann Nucl Energy 2013:13756.
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i
20
[29] Groth KM, Swiler LP. Bridging the gap between HRA research and HRA
practice: a Bayesian network version of SPAR-H. Reliab Eng Syst Saf
2013;115:3342.
[30] Cai B, Liu Y, Zhang Y, Fan Q, Liu Z, Tian X. A dynamic Bayesian networks
modelling of human factors on offshore blowouts. J Loss Prev Process Ind
2013:63949.
[31] Martins MR, Maturana MC. Application of Bayesian Belief networks to the
human reliability analysis of an oil tanker operation focusing on collision
accidents. Reliab Eng Syst Saf 2013;110:89109.
[32] Vinnem JE, Bye R, Gran BA, Kongsvik T, Nyheim OM, Okstad EH, Seljelid J, Vatn
J. Risk modelling of maintenance work on major process equipment on offshore petroleum installations. J Loss Prev Process Ind 2012;25(2):27492.
[33] Langseth H, Portinale L. Bayesian networks in reliability. Reliab Eng Syst Saf
2007;92(1):92108.
[34] Neil M, Fenton N, Nielson L. Building large-scale Bayesian networks. Knowl
Eng Rev 2000;15(3):25784.
[35] Groth KM, Mosleh A. A data-informed PIF hierarchy for model-based Human
Reliability Analysis. Reliab Eng Syst Saf 2012;108:15474.
[36] Forester J, Dang VN, Bye A, Lois E, Massaiu S, Bromberg H, Braarud P, Boring
R, Mnnist I, Liao H, Julius J, Parry G, Nelson P. The international HRA
[37]
[38]
[39]
[40]
[41]
Please cite this article as: Mkrtchyan L, et al. Methods for building Conditional Probability Tables of Bayesian Belief Networks from
limited judgment: An evaluation.... Reliability Engineering and System Safety (2016), http://dx.doi.org/10.1016/j.ress.2016.01.004i