Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Reliability Engineering and System Safety 112 (2013) 200–213

Contents lists available at SciVerse ScienceDirect

Reliability Engineering and System Safety


journal homepage: www.elsevier.com/locate/ress

Efficient Bayesian network modeling of systems


Michelle Bensi a,n,1,2, Armen Der Kiureghian b, Daniel Straub c
a
U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001, USA
b
Department of Civil and Environmental Engineering, University of California, Berkeley, CA 94720, USA
c
Engineering Risk Analysis Group, Technische Universität München, Munich, Germany

a r t i c l e i n f o a b s t r a c t

Article history: The Bayesian network (BN) is a convenient tool for probabilistic modeling of system performance,
Received 14 February 2012 particularly when it is of interest to update the reliability of the system or its components in light of
Accepted 22 November 2012 observed information. In this paper, BN structures for modeling the performance of systems that are
Available online 12 December 2012
defined in terms of their minimum link or cut sets are investigated. Standard BN structures that define
Keywords: the system node as a child of its constituent components or its minimum link/cut sets lead to
Bayesian network converging structures, which are computationally disadvantageous and could severely hamper
Integer optimization application of the BN to real systems. A systematic approach to defining an alternative formulation
Max-flow min-cut theorem is developed that creates chain-like BN structures that are orders of magnitude more efficient,
Minimum cut sets
particularly in terms of computational memory demand. The formulation uses an integer optimization
Minimum link sets
algorithm to identify the most efficient BN structure. Example applications demonstrate the proposed
Parallel systems
Series systems methodology and quantify the gained computational advantage.
Systems Published by Elsevier Ltd.

1. Introduction The Bayesian network (BN) is an ideal framework for the


analysis of such systems, particularly when updating of the
Engineering decisions often involve probabilistic assessment probabilistic model in light of evolving and uncertain information
of the state of a system under evolving and uncertain information. is an important objective. The BN is a graphical model consisting
For example, in the immediate aftermath of a natural disaster, of nodes and directed links, which respectively represent random
such as an earthquake affecting an urban community, decisions variables and their probabilistic dependencies [20,11]. The vari-
must be made regarding dispatch of rescue teams and inspection ables may represent the states of the components of a system, or
crews, continued operation or closure of facilities, and prioritiza- their capacities and demands. The BN provides a convenient
tion of repair actions and restoration of services, all of which means for modeling dependence between the component states,
depend on the assessment of the functioning states of various which is rather difficult in most classical system reliability
infrastructural systems. Such assessment is strongly influenced by methods [19]. Furthermore, upon entering evidence on one or
the available information, which in the immediate aftermath of a more variables, e.g., the observed states, capacities or demands of
natural disaster is highly uncertain and rapidly evolves as the a subset of the components, the information propagates through-
states of various system components are observed or measure- out the network and updates distributions of other random
ments of the hazard are made. Another example is the manage- variables, e.g., the states of other components and the system,
ment of a deteriorating system, where decisions need to be made in accordance with the Bayes’ rule. Finally, by addition of decision
on the frequency and extent of inspections and on maintenance, and utility nodes, the BN renders a decision graph that facilitates
repair and replacement actions, while future capacities and decision-making in accordance with the maximum expected
demands of the system remain uncertain. In both cases, there is utility criterion [22,11].
need for a method to update the probabilistic assessment of the This paper focuses on the development of a systematic
system state as information, often of uncertain type, becomes approach to using BNs for modeling the performance of systems
available from measurements, inspections, and other observa- that are defined in terms of their minimum link sets (MLSs) or
tions of the system and its components. minimum cut sets (MCSs). The methodology presented in this
paper is motivated by our efforts in modeling the performance of
spatially distributed civil infrastructure systems (e.g., a highway
n
Corresponding author. network or water distribution system) subjected to an earthquake
E-mail address: michelle.bensi@nrc.gov (M. Bensi). hazard, with particular emphasis on post-earthquake risk assess-
1
Formerly of University of California, Berkeley, CA 94720, USA.
2 ment and decision making (see Bensi et al. [1]). For such an
Disclaimer: Any opinions, findings and conclusions expressed in this paper
are those of the author and do not necessarily reflect the views of the United application, efficient computations and near real-time inference
States Nuclear Regulatory Commission. in models of large systems are essential. Furthermore, the

0951-8320/$ - see front matter Published by Elsevier Ltd.


http://dx.doi.org/10.1016/j.ress.2012.11.017
M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 201

considered systems are more easily characterized in terms of their


MLSs/MCSs than by other means, such as fault trees, event trees or
reliability block diagrams. While this paper was motivated by this
specific application, the methods presented are applicable to a
broader scope of problems.
The BN has been used in the past for system reliability analysis
(see, e.g., [25,17,2,8,15,12,23,24]). Some of these works consider
intuitive approaches to modeling systems as BNs (e.g., [8]). Others
consider the fault tree (e.g., [15,2]) or the reliability block diagram
(e.g., [25]) as the native source of system information. Other
Fig. 1. A simple BN.
papers develop BNs for relatively simple systems, for which
computational demands are not of particular concern. This work
differs from previous efforts by defining a systematic approach to exclusive states of its parents. For root nodes that have no parents,
developing an efficient BN structure for modeling the reliability of e.g., X1 and X2 in Fig. 1, a marginal probability table is assigned.
complex systems when the MLSs or MCSs are the native source of The joint distribution of the random variables in the BN is
system information. The approach is particularly useful when given as the product of the conditional distributions, i.e.,
working with topologically defined systems, in which the system Y
n
decomposition is commonly done through the MLSs and/or MCSs. pðx1 ,x2 ,. . .,xn Þ ¼ pðxi 9Paðxi ÞÞ ð1Þ
While other authors have used BNs to model systems that are i¼1
topologically defined through a reliability block diagram where Pa(xi) is the set of parents of node Xi, p(xi9Pa(xi)) is the CPT
(e.g., [25]), no systematic attempt has been made to optimize of Xi and n is the number of random variables (nodes) in the BN.
the BN structure, particularly when working with large, multi- Thus, for the BN in Fig. 1, the joint probability mass function is
state systems. It turns out that conventional BN models rapidly      
grow in size and density with increasing size of the system, so pðx1 ,x2 ,x3 ,x4 ,x5 Þ ¼ p x5 9x4 p x4 9x1 p x3 9x1 ,x2 pðx1 Þpðx2 Þ ð2Þ
that even for moderately sized systems the computational and BNs are useful for answering probabilistic queries when one or
memory demands make the model infeasible, especially when
more variables are observed. As an example, suppose for the BN in
using exact inference algorithms with multi-state nodes. With Fig. 1 the observations X3 ¼x3 and X4 ¼x4 have been made and the
this shortcoming in mind, in this paper we develop methods for
conditional distribution p(x29x3,x4) is of interest. This posterior
generating efficient BN topologies for modeling systems with distribution is computed by first marginalizing the joint distribu-
binary and multi-state components. A discrete optimization
tion in (2) to obtain the joint distributions of the subsets of the
algorithm is developed that minimizes the density of the BN, variables:
thereby providing orders of magnitude savings in computational X
time and memory. This development facilitates consideration of pðx2 ,x3 ,x4 Þ ¼ pðx1 ,. . .,x5 Þ ð3Þ
x1 ,x5
systems, which otherwise could not be solved with conventional
BN formulations. X
The paper begins with a brief introduction to the BN. pðx3 ,x4 Þ ¼ pðx1 ,. . .,x5 Þ ð4Þ
x1 ,x2 ,x5
The introduction is limited to those aspects that are needed to
motivate the remainder of the paper. Next, efficient Bayesian The desired conditional distribution then is p(x29x3,x4) ¼p(x2,
network formulations for modeling series and parallel systems x3,x4)/p(x3,x4). While it is possible to obtain updated distributions
with binary components are presented. These are then extended by this method, this is not a computationally efficient approach
to general systems with binary and multi-state components. for non-trivial BNs. Several efficient algorithms for exact and
To automate construction of the efficient Bayesian network approximate probabilistic inference in BNs have been developed
formulations, a binary integer optimization problem is formu- (see, e.g., [3,13,14,16,26,27]). The general principles of exact
lated. Furthermore, two heuristic augmentations are presented to inference algorithms are outlined here to highlight the require-
reduce the size of the optimization problem. Several examples ments for efficient BN topologies.
demonstrate the proposed methodology and its effectiveness. The efficiency of the BN stems from the decomposition of the
joint distribution into local conditional distributions, as exempli-
fied in Eq. (2). When summing over the joint distribution, as in
2. Brief introduction to Bayesian networks Eqs. (3) and (4), no use of the decomposition is made and
computations are inefficient. However, by writing the joint dis-
A BN is characterized by a directed acyclic graph consisting of tribution in the product form of Eq. (1), it is possible to rearrange
a set of nodes representing random variables and a set of links the summation and product operations due to their distributive
representing probabilistic dependencies. In this paper, we limit and commutative properties. As an example, Eq. (3) is written as
the treatment to BNs in which all random variables are discrete; XX      
pðx2 ,x3 ,x4 Þ ¼ p x5 9x4 p x4 9x1 p x3 9x1 ,x2 pðx1 Þpðx2 Þ
the reader interested in BNs with continuous random variables is
x1 x5
referred to Langseth et al. [13]. Consider the simple BN in Fig. 1. X     X  
The directed links from X1 and X2 to X3 indicate that the ¼ pðx2 Þ p x4 9x1 p x3 9x1 ,x2 pðx1 Þ p x5 9x4 ð5Þ
x1 x5
distribution of X3 is defined conditioned on X1 and X2. In the BN
terminology, random variable X3 is said to be a child of random The summation operations can be interpreted as node eliminations.
variables X1 and X2, while the latter are the parents of X3. Since calculations are performed from right to left, Eq. (5) corre-
Similarly, X4 is a child of X1, while X5 is a child of X4. Each node sponds to an elimination of X5 followed by the elimination of X1.
is associated with a set of mutually exclusive and collectively Clearly, solving the second line of Eq. (5) is more efficient than
exhaustive states, corresponding to the outcome space of the solving the first, because the summations are performed in smaller
discrete random variable. Attached to each node is a conditional domains. The summation over X5 is in the domain of X4 and X5 only
probability table (CPT), providing the conditional probability mass (and can actually be omitted, since it results in 1). The summation
function of the random variable given each of the mutually over X1 is in the domain of X 1 , X 2 , X 3 and X4, for which it is required
202 M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213

to establish a table (called a potential), whose number of entries link sets (MLSs) and minimal cut sets (MCSs) for systems with
is equal to the product of the number of states of these variables. binary component and system states, but employ converging
In general, the sizes of the potentials over which summations are structures as in the naı̈ve formulation. It is shown that the MCS
performed determine the efficiency of the inference algorithm. formulation is also applicable to a certain class of systems with
The potentials, and consequently the efficiency of the inference multi-state components. We then develop two additional formu-
algorithm, depend on the ordering of node eliminations. There exist lations that employ MLSs/MCSs for systems with binary states, but
computationally optimal elimination sequences, all of which lead to result in chain-like BN topologies that are far more efficient for
the same domain set, i.e., the domains of the potentials arising in the computational purposes. These are first developed for series and
process are the same. The domains corresponding to the optimal parallel systems and then extended to general systems. The
elimination sequences are called cliques. The total size of the efficient MCS formulation is shown to be also applicable to a
potentials associated with these cliques is a good proxy for the certain class of systems with multi-state components.
computational effort required for performing inference in the BN
and is used in this paper to assess and compare efficiencies of
various BN system formulations.
4. BN system models using minimal link and cut sets
While all exact inference algorithms aim at finding the optimal
ordering of node eliminations, they follow different strategies for
4.1. Binary components and system
doing so. In particular, some algorithms optimize the elimination
for a specific inference task, while others, such as the junction tree
Consider a system with binary component and system states,
algorithm [11], optimize computations for general inference.
say survival/fail states. A minimal link set (MLS) is a minimum set
With the latter, parts of the computations are reused, which
of components whose joint survival constitutes survival of the
becomes efficient when the interest is in updated distributions of
system. The minimal link set BN formulation introduces intermedi-
many variables and when considering multiple evidence cases.
ate nodes between the component and system nodes, which
Our interest is more focused on general inference applications.
represent the states of the MLSs, as shown in Fig. 3. Torres-
Several of these algorithms are implemented in available software
Toledano and Sucar [25] used such a BN formulation for modeling
applications (e.g., [5,10]), facilitating inference in complex BNs.
system performance, though with less formality and generality
While this paper focuses on improving the computational
than described here. The binary states of the MLS nodes are
efficiency of exact inference algorithms, it is believed that the
defined such that each MLS node is in the survival state only if all
approaches developed here will also be useful for approximate
its constituent components have survived; otherwise, it is in the
algorithms by reducing the size of CPTs that must be stored.
fail state. The system node is in the survival state if any MLS node
We do not explore computational improvements that might be
is in the survival state. Let NMLS denote the number of MLSs of the
available for exact inference by consideration of deterministic
system and NMLS,i denote the number of components in the ith
substructures within the BN. As Nielsen et al. [18] have shown,
MLS. The size of the CPT of the ith MLS node is 2NMLS,i þ 1 , and the
advanced Boolean calculations can be used to improve the
size of the CPT of the system node is 2NMLS þ 1 . Clearly, when the
efficiency of exact algorithms when the deterministic part of a
number of MLSs is large, the size of the CPT associated with the
BN model is represented as a Boolean function. It is believed that
system node becomes large. A similar problem occurs for an MLS
such an approach can be used to further improve the computa-
node when the number of its constituent components is large.
tional efficiency of the BN model resulting from our topology
The dual of the MLS formulation is the minimal cut set BN
optimization scheme.
formulation. A MCS is a minimum set of components whose joint
failure constitutes failure of the system. In this formulation, the
system node is a child of nodes representing MCSs, and each MCS
3. Modeling system performance via Bayesian network
node is a child of nodes representing the states of its constituent

Consider a system of Nc components, with component i having


ni discrete states. The number of distinct configurations of the
Q c
system is N i ¼ 1 ni . We refer to a BN formulation that defines the
system state directly in terms of the states of its constituent
components as the naı̈ve BN formulation. Fig. 2 shows one such BN,
where node Ci defines the state of component i and node Ssys
defines the state of the system. If the system has Ns discrete states,
Q c
then the CPT associated with the system node has Ns  N i ¼ 1 ni
entries. Although this formulation has been used in the past (e.g.,
see [17]), for a system with even a moderate number of compo-
nents or component states, the size of the CPT for the system node Fig. 3. MLS formulation.
becomes so large that the BN becomes computationally intract-
able. Clearly, a more efficient BN formulation is needed.
As an alternative to the above naı̈ve approach, in this paper we
present four additional BN formulations for modeling system
performance. The first two formulations make use of minimal

Fig. 2. Naı̈ve BN formulation. Fig. 4. MCS formulation.


M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 203

components, see Fig. 4. The system node is a series system of all the Nodes Ci in Fig. 4 are modified to represent multiple states
MCS nodes, (i.e., the system node is in the fail state if at least one MCS corresponding to the capacity levels of each component. If the
node is in the fail state), whereas each MCS is a parallel system of its component has a continuous capacity state, then the range of
parent nodes (i.e., all constituent components must be in the fail possible capacities must be discretized into several small inter-
state for the MCS node to be in the fail state). As with the MLS vals; in such a case, node Ci is said to represent an interval node.
formulation, the CPTs in this formulation become large as the Similarly, nodes MCSi have multiple states having capacity values
number of MCSs, denoted NMCS, increases and/or the number of defined using the relation
components in an MCS, denoted NMCS,i for the ith MCS, becomes large. X
CapMCSi ¼ Capj ð6Þ
C j A MCSi

The capacity of the system node is obtained using the relation


4.2. Multi-state flow systems with multi-state components
Capsys ¼ min CapMCSi ð7Þ
i A ½1,...,N MCS 
A multi-state flow system with multi-state components can be
modeled by the MCS BN formulation through application of the When Ci are interval nodes, MCSi and Ssys are also interval nodes.
Max-Flow Min-Cut theorem [6,7]. We are not aware of a similar In constructing the CPTs of the latter nodes, the intervals for these
theory that allows adaptation of the MLS formulation to multi- nodes must be selected by considering the entire range of their
state flow systems. possible capacity values as obtained from Eqs. (6) and (7). More
Consider a system describing flow from a source node to a sink details about computation of CPTs for interval nodes is given in
node and identify its MCSs assuming components are binary. Each Bensi et al. [1].
component of the system has a flow capacity, which is discretized
into a set of distinct states, e.g., 0%, 25%, 50%, 75% and 100% of a
maximum capacity. Let Capi denote the capacity state of compo- 5. Efficient BN system models
nent i. For a distributed component with directed flow, we
consider the capacity when going from the source side to the 5.1. Motivation
sink side of the cut. Assign to each MCS a capacity value equal to
the sum of the capacities of its constituent components. The Max- The MLS and MCS formulations described in the preceding
Flow Min-Cut theorem states that the maximum flow capacity section result in converging BN structures. In general, BN struc-
from the source to the sink is equal to the minimum value among tures with nodes arranged in chains are significantly more
all MCSs, i.e., the bottleneck in the system. The theorem allows efficient than those having converging structures. As we will
adaptation of the MCS BN formulation to multi-state problems, show later, the two BN structures shown in Fig. 5 represent the
without changing the topology of the BN created when assuming same system. Fig. 5a shows a converging structure similar to the
components are binary. It is only necessary to increase the BN models presented in the previous section, and Fig. 5b illus-
number of states associated with each BN node to correspond to trates a chain structure. In both BNs, dependence among the
the component, MCS or system capacity levels, and use arithmetic components is considered by introducing a common demand
expressions rather than Boolean logic to define the relationships node D. A formal description of the construction of the BN in
between the nodes, as described below. Fig. 5b is presented later in this section.

Fig. 5. Equivalent BNs with (a) converging structure and (b) chain structure.

Fig. 6. Computational demands of system BNs with converging and chain topologies when components have (a) 2 states and (b) 5 states.
204 M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213

Fig. 6 compares the computational demands, measured in 5.2. Series and parallel systems with binary components
terms of the total clique sizes, for the BNs in Fig. 5 with
converging and chain structures, when the system components We now describe how the performance of systems with binary
have 2 and 5 states. As the number of components increase, the components can be modeled with BNs having the chain topology.
computational demand of the BN with converging structure Define a survival path sequence (SPS) as a chain of events, corre-
increases exponentially, while that of the BN with the chain sponding to a MLS, in which the terminal event in the sequence
structure increases linearly. However, for 2-state components, the indicates whether or not all the components in the MLS are in the
converging structure is more efficient than the chain structure survival state. Note that the term ‘‘sequence’’ does not have any
when the number of components is less than 4. Thus, when the temporal implications. A series system has one MLS and a parallel
node modeling system performance in Fig. 5a has more than system has Nc MLSs. It follows that a series system has one SPS and
3 parents (i.e., constituent components), it is advantageous to a parallel system has Nc SPSs. A SPS is comprised of a chain of
model the system as in Fig. 5b. survival path events (SPEs), each of which is associated with a
The computational demands associated with inference are component and describes the state of the sequence up to that
influenced not only by the system size and configuration, but event. SPEs are represented in the BN by nodes labeled Es,i, the
also by the number of common parents to the component nodes subscript i indicating the association with component i. The state of
(similar to node D in Fig. 5). Fig. 7 shows a comparison of Es,i is defined as
computational demands associated with the converging and  
Es,i ¼ 1 if Es,PaðiÞ ¼ 1 \ fC i ¼ 1g
chain BN topologies with binary component nodes with 1, 2 and
3 common parent demand nodes. It is observed that increasing ¼0 otherwise ð8Þ
the number of common parent nodes increases the computational where Es,Pa(i) defines the state of the SPE node that is parent to Es,i;
demand. However, the chain structure remains advantageous to Es,i ¼ 1 indicates that the node is in the survival state and Es,i ¼0
the converging structure as the number of components increases. indicates its failure (we use this Boolean notation throughout this
Note that, as the number of common demand nodes increases, the paper). Thus, for a series system, the BN formulation takes the form
‘‘cut-off’’ point at which the chain structure is more efficient than shown in Fig. 8a. The state of node Es,1 is equal to the state of node
the converging structure moves slightly upward. For three com- C1. Es,2 is in the survival state only if Es,1 is in the survival state and
mon demand nodes, the chain structure is more efficient for 5 or C2 is in the survival state. This pattern continues such that Es,Nc is in
more components and for one common demand node, it is more the survival state only if both Es,Nc 1 and C Nc are in the survival
efficient for 4 or more components. state. Consequently, the state of Es,Nc describes the state of the
entire SPS (i.e., it indicates whether all components in the MLS have
survived) and, therefore, that of the series system. The state of
node Ssys is equal to the state of Es,Nc in Fig. 8a.
A parallel system has a SPS corresponding to each component.
The resulting BN formulation is shown in Fig. 8b. The system node
indicates system survival if any node Es,i is in the survival state.
Like the naı̈ve formulation, the exponential growth in the size of
the CPT associated with the system node renders this BN
intractable when the number of components is large.
Define a failure path sequence (FPS) as a chain of events,
corresponding to a MCS, in which the terminal event in the
sequence indicates whether or not all components in the MCS
are in the fail state. For a series system, there are Nc FPSs, one
corresponding to each component. For a parallel system, there is
only one MCS and thus one FPS. A FPS is comprised of a chain of
failure path events (FPEs), each of which is associated with a
component and gives the state of the sequence up to that event.
Let Ef,i be the node in the BN that represents the FPE associated
with component i. The state of Ef,i is defined as
Fig. 7. Comparison of computational demands associated with converging and  
chain BN topologies for binary nodes with one or more common parent demand
Ef ,i ¼ 0 if Ef ,PaðiÞ ¼ 0 \ fC i ¼ 0g
nodes. ¼1 otherwise ð9Þ

Fig. 8. BN using SPEs to model performance of (a) series system, (b) parallel system.
M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 205

where Ef,Pa(i) defines the state of the FPE node that is parent to subscript corresponding to the associated component i and a
Ef,i. For a series system, the BN formulation using FPSs takes the superscript corresponding to the associated MLS j. The depen-
form shown in Fig. 9a, which has the undesirable converging dence between SPEs that share a component is modeled
structure. For a parallel system, the BN formulation takes the through a common parent node. The system node is in the
chain form shown in Fig. 9b. These findings suggest that a survival state if the terminal node of any SPS is in the survival
combination of SPS and FPS formulations can be used to state. For reference, the BN formulation in which the MLSs are
efficiently model general systems. This approach is described arranged in chain structures is named efficient MLS BN formula-
in the next section. tion. Similar logic leads to the creation of an efficient MCS BN
formulation, whereby strings of FPSs are constructed corre-
5.3. General systems with binary component states sponding to each MCS.
The dependence between SPEs or FPEs sharing a compo-
A MLS is a series system of its constituent components. nent increases the computational demand when performing
Therefore, using the above formulation, each MLS of the system inference in the BN. By coalescing common SPEs/FPEs that
can be described by an SPS, resulting in a chain-like BN appear in multiple SPSs/FPSs, the number of nodes and links in
structure. Consider the example system in Fig. 10a, which has the BN, and hence the computational demand, are reduced. In
four MLSs: MLS1 ¼{1,7,8}, MLS2 ¼{2,7,8}, MLS3 ¼{3,7,8} and the example system, components 7 and 8 appear in all SPSs.
MLS4 ¼{4,5,6,7,8}. In Fig. 10b each MLS is modeled as an We take advantage of this observation and introduce only one
individual SPS. The SPEs, Ejs,i , in each SPS are indexed by a ‘‘instance’’ of the SPEs associated with these components. The

Fig. 9. BN using FPEs to model performance of (a) series system and (b) parallel system.

Fig. 10. (a) Example system and (b) efficient MLS formulation with distinct SPSs.
206 M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213

Fig. 11. Efficient MLS formulations for the example system with coalesced SPEs associated with components 7 and 8 using (a) a converging structure (b) a chain structure.

Es,11 Es,21 Es,31 Es,41 Es,jn

Es,jn Es,11 Es,21 Es,31 Es,41

Fig. 12. BN used to illustrate constraint (b).

resulting BN is shown in Fig. 11a. Note that this configuration definition:


also avoids the converging structure of the system node. It    
Ef ,i ¼ 0 if Ef ,PaðiÞ ¼ 0 \ Es,PaðiÞ ¼ 0 \ fC i ¼ 0g
does, however, require a converging SPE node (node E s,7 in
¼1 otherwise ð11Þ
Fig. 11a). The states of such SPE nodes having multiple SPEs as
parents are specified using the Boolean relation where Ef,Pa(i) and Es,Pa(i) are the FPE and SPE nodes, respectively,
  that are parents to Ef,i.
Es,i ¼ 1 if ½[ Es,PaðiÞ ¼ 1  \ fC i ¼ 1g While all three BN models of the example system (Fig. 10b,
¼0 otherwise ð10Þ Fig. 11a and Fig. 1b) are termed efficient MLS formulations,
their efficiency is in fact quite variable. The total clique size
A notational change has been introduced in Fig. 11a: The associated with the BN in Fig. 10b is 224, the one associated
superscript on each SPE node, which previously indicated the MLS with the BN in Fig. 11a is 108 and the one associated with
index, now represents the instance of the SPE, i.e., when multiple the BN in Fig. 11b is 64. This illustrates the potential efficiency
SPEs are associated with the same component, then they are gain when coalescing multiple instances of SPEs in dif-
recognized as different instances of the SPE and are distinguished ferent SPSs.
through the superscript. For this example system, because each Thus far, the SPEs in a SPS (FPEs in a FPS) corresponding to a
component is associated with only one SPE, all superscripts in particular MLS (MCS) have been arranged in an arbitrarily selected
Fig. 11a are 1. In the following, we drop the instance index, unless order. For complex systems, the arrangement of the SPEs in the
it is required for clarity. SPSs may strongly influence our ability to coalesce multiple
Note that the converging structure of node Es,7 in Fig. 11a instances of SPEs in different SPSs (analogously FPEs in FPSs).
arises because of the need to represent a parallel sub-system. The order in which SPEs (FPEs) appear can be optimized such that
Since parallel systems are ideally represented using chains of SPEs in as many SPSs (FPEs in as many FPSs) as possible are
FPEs, the converging structure can be modified by replacing the coalesced. As demonstrated earlier, this reduces the number of
SPE nodes associated with components 1, 2 and 3 with FPE nodes nodes and links in the BN. This optimization problem is described
arranged in a chain, resulting in the BN in Fig. 11b. The definition next. For brevity, only the formulation employing SPSs is pre-
of the FPE nodes with SPE nodes as parents follows the original sented; a dual formulation applies to FPSs. Since the focus is on
M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 207

SPEs only, the possibility to combine SPEs and FPEs is not Third, there are two constraints governing the arrangement
considered. Such a combination can be performed as an addi- of the SPE nodes in the BN: (a) each MLS must be represented by
tional step after the optimization of the SPEs (or FPEs), similar to a SPS, and (b) no SPS may exist that is not strictly a MLS.
the example shown in Fig. 11b. Violation of the first constraint results in exclusion of one or
more MLSs, causing underestimation of the system reliability.
Violation of the second constraint results in a BN that includes
6. Optimal ordering of survival path events one or more fictitious MLSs, thus causing overestimation of the
system reliability.
The aim of this section is to formalize the problem of finding Constraint (a) requires that each MLS be represented as a SPS, i.e.,
the optimal arrangement of SPEs in SPSs for a general system. Let at least one permutation of the SPEs associated with the components
L(im,jn) ¼1 indicate the existence of a directed link from node Em in the MLS must be connected as a chain. Let NMLS,i denote
s,i
to node Ens,j in the efficient MLS BN formulation and L(im,jn) ¼0 the number of components in MLSi. For the example system in
indicate the absence of such a link, where i and j are component Fig. 10a, we have NMCS,1 ¼NMCS,2 ¼NMCS,3 ¼3 and NMCS,4 ¼ 5. Let Pi
indices and m and n are indices denoting the instances of these denote the set of permutations, without replacement, of the
SPE nodes in the BN. Also, let C m component indices in MLSi and define pai ¼ fpai,1 , pai,2 ,. . .,pai,NMCS,i g as
i ¼ 1 indicate a directed link
between the node representing component i and node Em its ath member. As an example, for the system in Fig. 10a, we have
s,i and 
Sm m P1 ¼ p11 ¼ ð1,7,8Þ, p21 ¼ ð1,8,7Þ, p31 ¼ ð8,1,7Þ, p41 ¼ ð7,1,8Þ, p51 ¼
i ¼ 1 indicate a directed link between Es,i and the system node
(with C m m ð7,8,1Þ, p61 ¼ ð8,7,1Þg.
i ¼ 0 and Si ¼ 0, respectively denoting their absences).
The decision variables in the optimization problem are the links Next, let Qi denote the set of permutations with replacement of
between the SPE nodes, L(im,jn). The remaining links, C m m NMCS,i draws from the index set f1,. . ., N I g and define qbi ¼ fqbi,1 ,
i and Si ,
m n
follow from the L(i ,j ), as described later. Formulation of this qbi,2 ,. . .,qbi,NMLS,i g as its bth member. Using the example in Fig. 10a and

optimization problem assumes the use of only SPE nodes as assuming NI ¼2, we have Q 1 ¼ q11 ¼ ð1,1,1Þ, q21 ¼ ð1,1,2Þ, q31 ¼
defined in Eq. (10) and a converging structure at the system ð1,2,1Þ, q41 ¼ ð1,2,2Þ, q51 ¼ ð2,1,1Þ, q61 ¼ ð2,1,2Þ, q71 ¼ ð2,2,1Þ, q81 ¼
node. To further increase computational efficiency of the resulting ð2,2,2Þg. Note that Pi has NMLS,i! members, while Qi has NI MLS,i
N
BN, the converging structure at the system or any other node can
members.
be replaced by a chain structure by use of FPEs in the manner
Define the set r ai , b ¼ ½r ai,1, b , r ai,2, b ,. . .,r ai,N, bMLS,i , which combines the
described in Fig. 11.
Using the number of links in the BN as a proxy for computa- elements of pai and qbi . Specifically, r ai , b includes the component
tional demands required when performing inference, the objec- indices in pai with superscripts specified according to qbi . For the
tive of the optimization problem is to minimize the number of example system, r 1,1 1 1 1 1,2 1 1 2 2,4 1 2 2
1 ¼ f1 ,7 ,8 g, r 1 ¼ f1 ,7 ,8 g, r 1 ¼ f1 ,8 ,7 g,
links in the BN. This is formulated as etc. Overall, for this particular MLS, there are 3!*23 ¼48 possible
2 3 ways to arrange the component indices and the instance super-
X
Nc XNc X NI XNI NI NI
 m n X Nc X
m
XNc X
m
min4 L i ,j þ Ci þ Si 5 ð12Þ scripts.
i¼1j¼1m¼1n¼1 i¼1m¼1 i¼1m¼1 For convenience, define the sum

where NI is the maximum number of instances of any SPE. It is NMLS,i


X1
desirable that NI be as small as possible, but its value is not X ai , b ¼ L½r ai,l, b , r ai,l, bþ 1 , ð15Þ
known prior to solving the optimization problem. Thus, an l¼1
iterative procedure is used to find the smallest NI for which
the optimization problem has a feasible solution. To ensure where r ai,l, b is the lth element of r ai , b . X ai , b ¼ NMLS,i 1 only if the SPEs
that the BN structure represents the system through SPEs in corresponding to the components in MLSi form a SPS in the order
the manner described in the preceding section, a number of specified by pai and with instance indices according to qbi . For a
constraints on the optimization problem are formulated, as SPS associated with the ith MLS to exist in the BN, we must have
follows. X ai , b ¼ N MLS,i 1 for at least one component/instance index ordering
First, every SPE node must have a link pointing to it from the from the set r ai , b . The constraint is written as
corresponding component node. Specifically, C m m
i ¼ 1 if node Es,i
N
exists in the BN, which occurs if the decision variables indicate maxX ai , b Z NMLS,i 1 8i, a ¼ 1,. . .,N MLS,i !, b ¼ 1,::,N I MCS,i
a link going into or out of node Em s,i . (A node without links
a, b

going into or out of it can be removed from the BN.) Mathematically, ð16Þ
this is formulated as a constraint on the optimization problem,
written as
2 3 where,Zis used rather than equality for convenience of the
XNc X NI
  m n  n m  optimization algorithm.
4 L i ,j þL j ,i Z 15 ) C m
i ¼1 ð13Þ Constraint (b) requires that no SPS exist in the BN that does
j¼1n¼1 not correspond to a MLS. Consider the BN segment shown in
Fig. 12a. Let the shaded nodes (E1s,1 -E1s,2 -E1s,3 -E1s,4 ) represent a
Second, if Ems,i exists and has no other SPE node as a child, then
particular permutation of component/instance indices r ði a, bÞ ¼
it is a terminal node in a SPS. Such a node must have a link to the
f11 ,21 ,31 ,41 g resulting in a valid SPS. Constraint (b) must pro-
system node, i.e., Sm i ¼ 1. This leads to the second constraint on
hibit a SPE Ens,j , for any n, from ‘‘branching-off’’ the SPS at any
the optimization problem, written as
2 3 2 3 node, i.e., being a child of any node in the chain, unless
XNc X NI
 n m Nc X
X NI
 m n component j exists in a MLS with all the preceding components
4 L j ,i Z1 \ 5 4 L i ,j ¼ 05 ) Smi ¼1 ð14Þ in the sequence. For example, in Fig. 12a, Ens,j cannot exist as a
j¼1n¼1 j¼1n¼1
child of E1s,3 unless components 1,2,3 and j exist together in a
Well known techniques are available for modeling ‘‘if-then’’ MLS. If components 1,2,3 and j do not exist in a MLS, then the
propositions, as in the preceding two equations, into constraints false survival path shown by nodes with dashed edges is introdu-
in numerical optimization, e.g., see Sarker and Newton [21]. ced into the BN. The associated constraints for all valid SPSs are
208 M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213

written as component i exists in a MLS with all subsequent components


n n o o in the sequence. For example, in Fig. 12b, Ens,j cannot be
½X ai , b ¼ NMLS,i 1 ) L½r ai,l, b ,jn  ¼ 0, 8j : pai,1 ,. . .,pai,l ,j 2
= MLSm ,8m , 8i, n, l, a, b a parent of E1s,2 unless components 2,3,4 and j exist together
ð17Þ in a MLS. The second constraint for all valid SPSs takes the
form
Furthermore, constraint (b) must prohibit SPE Ens,j , for any n, n
½X ði a, bÞ ¼ NMLS,i 1 )
from being a parent to any node in a valid SPS, unless

Fig. 13. (a) Example network system; (b) efficient MLS BN formulation with one SPS highlighted and (c) BNs showing SPSs corresponding to remaining MLSs.
M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 209

n o o provided component 10 is working. This adds 4 more connectivity


L½jn ,r ði,la, bÞ  ¼ 0, ðaÞ
8j : j,pi,l ðaÞ
,. . .,pi,N MLS,i
= MLSm ,8m ,
2 8i, n, l, a, b paths through the system: {1,3,10}, {1,4,10}, {2,3,10}, {2,4,10}.
ð18Þ Thus, overall, the system has 7 MLSs. The BN obtained using the
proposed optimization algorithm is shown in Fig. 13b, where the
Combining (17) and (18) results in constraint (b), written as SPS corresponding to the MLS {5,6,7,8,9} is highlighted by shaded
n nodes. Fig. 13c shows the same BN with the SPSs corresponding to
½X ði a, bÞ ¼ N MLS,i 1  ) each of the remaining MLSs similarly highlighted. The total clique
N
X MLS NI NX
X MLS,i X size associated with this BN is 184. The total clique size of the MLS
L½r ði,la, bÞ ,jn  BN formulation with the converging structure (similar in form to
 
m ¼ 1,m a i n ¼ 1 l ¼ 1 8j: aÞ
pði,1 ,...,pði,laÞ ,j 2
= MLSm the general configuration in Fig. 4) is 5140, and it is 211 ¼2048
9 with the naı̈ve BN formulation. When intermediate nodes are
>
>
N
X MLS NI NX
X MLS,i X >
= introduced in the MLS BN formulation to ensure no node has more
n ða, bÞ
þ L½j ,r i,l  ¼ 0 , 8i, a, b than three parents (a common approach for reducing the number
n o >
>
m ¼ 1,m a i n ¼ 1 l ¼ 1 ðaÞ ðaÞ >
; of parents in BNs, see [23]), the total clique size reduces to 804,
8j: j,pi,l ,...,pi,N = MLSm
2
MLS,i
but remains substantially higher than that achieved with the
ð19Þ efficient MLS BN topology. Thus, the optimized BN is over an order
Constraint (b) along with the objective function, the minimization of magnitude computationally more efficient than the alternate
of which ensures that links that are not necessary for constructing the approaches. Furthermore, note that node Ssys is a parallel system
required SPSs are not in the BN, prohibits formation of invalid SPSs in of its four parent SPS nodes. A small additional computational
the BN. advantage is achieved by modifying the converging structure with
The efficient MCS formulation is the dual of the efficient MLS a chain structure, as demonstrated in Fig. 11b for the earlier
formulation, where strings of FPSs are constructed corresponding example application.
to each MCS. Therefore, for constructing an FPS formulation, an
optimization problem identical to the above with SPEs replaced
by FPEs is formulated. 7. Heuristic augmentation
The integer optimization problem described above requires
consideration of permutations of component indices and As mentioned earlier, the binary optimization problem described
instances. Consequently, the size of the problem rapidly grows above rapidly grows in size due to the requirement to consider all
with the number of components. To overcome this difficulty, permutations of component indices and instances. To overcome this
several heuristics are introduced in a later section of this paper. problem, in this section we present two heuristics: One aims at
reducing the number of components that need to be considered, and
6.1. Extension to multi-state flow systems one aims at reducing the number of permutations. Additional
heuristics can be developed to further improve the performance
As with the standard MCS formulation, the efficient MCS and scalability of the optimization algorithm described in this paper.
formulation can be adapted to handle multi-state problems
through the application of the Max-Flow Min-Cut Theorem. The
topology of the BN need not differ from the topology used for the 7.1. Heuristic employing super components
binary state problem. It is only necessary to increase the number
of states associated with each node and use arithmetic expres- Der Kiureghian and Song [4] introduced the idea of multi-scale
sions instead of Boolean relations to define the CPTs. The states of modeling of systems, whereby subsets of elementary components
the FPE nodes are associated with capacity values defined by are grouped into ‘‘super components.’’ Analysis is performed for
individual super components and results are then aggregated at
CapEf ,i ¼ min CapEf ,j þCapi ð20Þ
Ef ,j A PaðEf ,i Þ the system level. The super components typically comprise
simple sub-systems, such as components that exist in series or
That is, the capacity value assigned to node Ef,i is equal to the in parallel along a system link. Use of super components reduces
minimum of the capacity values of its parent FPE nodes, plus the the effective number of components and, thereby, permutations
capacity of the associated component. Thus, the capacity of each of their indices. It also facilitates the combining of SPSs and FPSs.
FPE node can be thought of as representing the ‘‘running total’’ of Once again, consider the simple system shown in Fig. 10a.
the capacities of the MCSs that it is a part of. The capacity of node Components C4, C5 and C6 exist in series as do components C7 and C8.
Ssys, representing the maximum operating level of the system, is We replace these subsets of components by two super components
the minimum capacity among all MCSs. Thus, it is defined as SC1 and SC2, respectively, as shown in Fig. 14. The system still has 4
Capsys ¼ min CapEf ,j ð21Þ MLSs, but the number of components in them is reduced: {1, SC2},
Ef ,j A PaðSysÞ
{2, SC2}, {3, SC2}, {SC1, SC2}.
Examination of Fig. 14 reveals that components C1, C2, C3 and
6.2. Example application SC1 exist in parallel. These components are next replaced by a
single super component resulting in the system representation
To illustrate the computational advantages of using the pro- shown in Fig. 15. Now, components SC2 and SC3 exist in series and
posed efficient BN formulation, consider the system in Fig. 13a can be replaced by another super component. The BN resulting
consisting of 10 labeled components. In this example, a source from this sequential procedure for identifying components that may
and a sink are connected, by default, by two connectivity paths. be grouped and replaced by a super component is shown in Fig. 16.
One connectivity path is represented by a solid line and the other For super components containing less than 4 constituent components,
by short dashed lines. In this configuration, the system has three a converging structure is used. For super components with 4 or more
MLSs: {1,2}, {3,4}, and {5,6,7,8,9}. Component 10 represents a constituent components, a chain structure is utilized.
switch, which can be used to change from the default configura- Note that components in a super component need not be
tion to an alternate configuration represented by long dashed contiguous. For example, in the system in Fig. 17, components
lines in Fig. 13a. This alternate configuration can be ‘‘switched to,’’ 1 and 4 can be put into a super component because, with regard
210 M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213

Fig. 14. System in Fig. 10a with component sets (C4, C5, C6) and (C7, C8), respectively replaced by super components SC1 amd SC2.

Fig. 15. System in Fig. 14 with component (C1, C2, C3, SC1) replaced by a super component.

formed super components) that always appear together in a MLS


(MCS) and never appear separately. In a MLS (MCS)-based formula-
tion, Class A super components correspond to components that exist
in series (parallel). To identify such super components in the pth
iteration of the algorithm, we assign to each component (or pre-
viously formed super component) j the quantity mðjA,pÞ defined by
N
X MLS

mA,p
j ¼ 2i Mpi,j ð23Þ
i¼1

This quantity is identical for different components only when the


components always appear together in certain MLSs (MCSs) and
never separately in different MLSs (MCSs). For example, for the
system in Fig. 10a, we have mA,0 A,0 A,0
1 ¼ 2, m2 ¼ 4, m3 ¼ 8,
A,0 A,0 A,0 A,0 A,0
m4 ¼ m5 ¼ m6 ¼ 16 and m7 ¼ m8 ¼ 30. Each set of compo-
nents having identical mA,pj can be grouped to form a Class A super
component. Matrix Mp must then be updated to Mp þ 1 by remov-
Fig. 16. BN constructed for system in Fig. 10a using the super component heuristic. ing columns corresponding to components that were grouped and
adding a column to represent the new super component. Let SCj
denote the newly formed super component. The elements of the
new column of the updated matrix are defined by
X p
Mpi,SC
þ1
j
¼ 1 if M i,k 40
k A C pgrp

¼0 otherwise ð24Þ
Fig. 17. Example system illustrating non-contiguous components that can be
combined into a super component. where C pgrp
is the set of components that were grouped to form
the new super component. We perform this operation repeatedly
to formation of MLSs and MCSs, they have the same effect as if until all super components of Class A are formed. For the example
they physically existed in series. system in Fig. 10a, using an MLS formulation, two super compo-
We now present an algorithm for sequential identification and nents of Class A are identified and the updated matrices M1 and
replacement of elementary components by super components, or M2 are as shown in the middle of Fig. 18.
sets of super components by higher level super components. The second class of super components, Class B, comprises
The first step in the algorithm is construction of an initial components that appear in different MLSs (MCSs), but share these
‘‘correspondence’’ matrix M0 that contains a row corresponding MLSs with the same set of other components. For a MLS (MCS)-
to each MLS (MCS) and a column corresponding to each elemen- based formulation, these correspond to components in parallel
tary component. The elements M 0ij of this matrix are defined by (series). To identify such super components in the pth iteration of
the algorithm, we assign to each component (or previously
M 0i,j ¼ 1 if component j is a member of MLS ðMCSÞ i formed super component) j the quantity mB,p defined by
j
¼0 otherwise ð22Þ 2 0 13
X X k p
mB,p ¼ 4M p  @ 2 Mi,k A5 ð25Þ
For the example system in Fig. 10a, matrix M0 is as given at the j
i
i,j
kaj
top of Fig. 18. In each subsequent step of the algorithm, the
correspondence matrix is updated by eliminating columns corre- One can easily verify that components (or super components) that
sponding to components that are grouped into a super compo- have identical mB,p
j
values satisfy the above conditions for a Class
nent, and creating a new column to represent the new super B super component and can be so grouped. As an example, for the
component. Let Mp denote the correspondence matrix in the pth system in Fig. 10a, we have mB,2 B,2 B,2 B,2
1 ¼ m2 ¼ m3 ¼ mSC 1 ¼ 32. Matrix
step of the algorithm with its elements denoted M pi,j . p
M is now updated by removing columns corresponding to the
Two types of super components are identified. Class A super grouped components and adding a column for the new super
components are made up of groups of components (or previously component with elements defined by Eq. (24). Since the
M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 211

Fig. 18. Correspondence matrices of example system before and after identification and formation of Class A and Class B super components.

combined components come from different MLSs (MCSs), this Component Number of appearances in a MLS
process renders some rows of the matrix zero, which can be
removed. For the example system, this process leads to the 1 5
updated correspondence matrix M3, which is shown in the 2 3
bottom of Fig. 18. 3 2
The above iterative procedure for finding and replacing com- 4 3
ponents with super components of Class A and Class B is repeated 5 3
until no super components remain. The matrix Mp that corre- 6 1
sponds to the last iteration is then used to specify the components 7 3
and the corresponding MLSs or MCSs required for defining the 8 1
optimization problem. 9 2

7.2. Heuristic for reducing the number of permutations


The above table leads to the ordered list O¼{1,2,4,5,7,3,9,6,8}.
Recall that the optimization algorithm considers all permuta- In the case of ties, the order is based on component index value.
tions of component indices and instances as specified in the sets Step 2: Re-order the components within the MLSs based on the
r ai , b ¼ ½r ai,1, b , r ai,2, b ,. . .,r ai,N, bMLS,i , i¼1,y, NMLS. (Every where in this sec- order O. For the example system, the new MLS component
tion the acronym MLS can be exchanged with MCS.) The aim of the orders are:
second heuristic is to drop selected members of these sets. MLS1 ¼{1,2,4,3}, MLS2 ¼{1,4,5,6,8}, MLS3 ¼{1,4,7}, MLS4 ¼{2,5,3},
Observe that if a set of components appear in all MLSs, then it is MLS5 ¼{1,5,7}, MLS6 ¼{1,2,9}, MLS7 ¼{7,9}.
not necessary to consider permutations of their indices. (In fact, such Step 3a: Determine all pair-wise intersecting sets between the
a set of components would be identified and combined as a super MLSs:
component.). The present heuristic identifies components that
Mi,j ¼ MLSi \ MLSj , i ¼ 1,. . ., ðNMLS 1Þ, j ¼ ðiþ 1Þ,. . .,N MLS ð26Þ
appear in several (but not all) MLSs and locks the order of appearance
of their indices, thus removing selected members of r ai , b . This For the example system, we have M1,2 ¼M1,3 ¼M2,3 ¼{1,4},
heuristic is likely to result in a BN topology that is suboptimal, but M1,6 ¼{1,2}, M3,5 ¼{1,7}, M2,5 ¼{1,5}, M1,4 ¼{2,3}, M 1,5 , M 2,4 , M 2,6 ,
is necessary if the size of the optimization problem is larger than can M3,6 , M3,7 , M4,5 , M 4,6 , M5,6 , M5,7 and M6,7 are sets of cardinality 1
be handled by the available resources. The heuristic should be used and M17 ¼M27 ¼M34 ¼M47 ¼|.
after reducing the size of the problem through identification of super Step 3b: Define G as a set containing the unique sets Mi,j with
components. cardinality greater than 1. For the example system, G ¼ ff1,4g,
To facilitate the explanation of the heuristic, an example f1,2g, f1,5g, f1,7g, f2,3gg:This set contains sets of components that
system is used to illustrate each step of the procedure. Consider appear together in two or more MLSs with the component indices
an arbitrary system with seven MLSs: MLS1 ¼{1,2,3,4}, ordered according to Step 1.
MLS2 ¼{1,4,5,6,8}, MLS3 ¼{1,4,7}, MLS4 ¼{2,3,5}, MLS5 ¼{1,5,7}, Step 4: Sequentially assign to each MLS a set from within G
MLS6 ¼{1,2,9}, MLS7 ¼{7,9}. whose intersection with the MLS has the largest cardinality.
Step 1: Create an ordered list of the component indices based Let gi,k be the intersection of the ith MLS with the kth member
on the number of times they appear in the various MLSs. Call this of G, Gk, i.e.,
list O. For the example system, the number of occurrences of each
g i,k ¼ MLSi \ Gk ð27Þ
component within a MLS is shown in the following table:
212 M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213

Define g 0i as the set gi,k which has the largest cardinality: For i¼5, MLS5 ¼ {1,5,7}:

  g 05 ¼ f1,5g; G0 ¼ ff1,4g, f2,3g, f1,5gg


g 0i ¼ g i,max : 9g i,max 9 ¼ max 9g i,k 9 ð28Þ n0c,1 ¼ 2, n0c,4 ¼ 1, n0c,2 ¼ 1; n0c,3 ¼ 1; n0c,5 ¼ 1; n0c,j ¼ 0, j ¼ 6,. . .,9
k
G ¼ ff1,4g, f1,5g, f2,3gg
In the case of ties in the cardinality, the set within G that appears
first is selected. g0 i is the set assigned to the ith MLS. Once a set For i¼6, MLS6 ¼ {1,2,9}:
from within G has been assigned to a MLS, place it in a new set G0 ,
g 06 ¼ |; G0 ¼ ff1,4g, f2,3g, f1,5gg
if it has not already been placed there. Define n0c,j as the number of
n0c,1 ¼ 2, n0c,4 ¼ 1, n0c,2 ¼ 1; n0c,3 ¼ 1; n0c,5 ¼ 1; n0c,j ¼ 0, j ¼ 6,. . .,9
times component j appears within the sets in G0 . When a
component has appeared in NI sets within G0 (where NI is the G ¼ ff1,4g, f1,5g, f2,3gg
maximum allowed number of instances of SPEs in the optimiza-
tion problem), remove from G all remaining sets containing that For i¼7, MLS7 ¼ {7,9}:
component, unless the set is already a member of G0 . This step is g 07 ¼ |; G0 ¼ ff1,4g, f2,3g, f1,5gg
necessary because, if n0c,j 4N I for any component, the optimiza- n0c,1¼ 2, n0c,4 ¼ 1, n0c,2 ¼ 1; n0c,3 ¼ 1; n0c,5 ¼ 1; n0c,j ¼ 0, j ¼ 6,. . .,9
tion problem may become infeasible.
G ¼ ff1,4g, f1,5g, f2,3gg
For the example system, using NI ¼ 2, the sets within G with
the longest intersection with MLS1 are {1,4}, {1,2}, and {2,3}. Note that, when MLS5 is considered, component 1 appears
Because set {1,4} appears first in G, it is assigned to MLS1. twice in the set G0 . Because component 1 has appeared NI ¼2
Therefore, g 01 ¼ f1,4g and this set is added to the set of sets G0 . times, all sets containing component 1 are removed from the set
It follows that n0c,1 ¼ n0c,4 ¼ 1 and n0c,j ¼ 0 for components j ¼ G, unless they already appeared in G0 .
2,3,5,y,9. These results for MLS1 are summarized as follows: Step 5: The last step of the heuristic is to modify the
optimization problem so that permutations on components not
For i¼1, MLS1 ¼{1,2,4,3}: contained within the sets g 0i ,i ¼ 1,. . .,NMLS , are not considered.
g 01 ¼ f1,4g; G0 ¼ ff1,4gg Recall that r ai , b ¼ ½r ai,1, b ,r ai,2, b ,. . .,r ai,N, bMLS,i  combines component indices
n0c,1 ¼ 1, n0c,4 ¼ 1, n0c,j ¼ 0, j ¼ 2,3,5,. . .,9 according to set pai with instance indices according to the set qbi .
G ¼ ff1,4g, f1,2g, f1,5g, f1,7g, f2,3gg To reduce the size of the optimization problem, we remove from
the set pai all permutations of component indices that are not
The results for the remaining MLSs are:
consistent with the order specified in g 0i . Furthermore, we remove
For i¼2, MLS2 ¼{1,4,5,6,8}: from the set qbi all instanceindices that are greater than n0c,i .
g 02 ¼ f1,4g; G0 ¼ ff1,4gg
nc,1 ¼ 1, n0c,4 ¼ 1, n0cj ¼ 0, j ¼ 2,3,5,. . .,9
0
7.3. Example application
G ¼ ff1,4g, f1,2g, f1,5g, f1,7g, f2,3gg
Once again consider the system in Fig. 13a consisting of 10
For i¼3, MLS3 ¼{1,4,7}: components and 7 MLSs. The super component heuristic is
g 03 ¼ f1,4g; G0 ¼ f1,4g
employed to obtain the solution in Fig. 13b. The only super
nc,1 ¼ 1, n0c,4 ¼ 1, n0c,j ¼ 0, j ¼ 2,3,5,. . .,9
0
component for this system is the one including components
G ¼ ff1,4g, f1,2g, f1,5g, f1,7g, f2,3gg 5–9, which are arranged in a single SPS. The arrangement of the
For i¼4, MLS4 ¼{2,5,3}: remaining SPSs is found through the full optimization algorithm
g 04 ¼ f2,3g; G0 ¼ ff1,4g, f2,3gg described in Section 6. The formulation of Fig. 13b was obtained
nc,1 ¼ 1, n0c,4 ¼ 1, n0c,2 ¼ 1; n0c,3 ¼ 1; n0c,j ¼ 0, j ¼ 5,. . .,9
0 without using the heuristic described in Section 7.2. This idealized
network system is sufficiently simple that it is possible to obtain a
G ¼ ff1,4g, f1,2g, f1,5g, f1,7g, f2,3gg
solution without requiring the heuristic, but for larger systems

Fig. 19. Efficient MCS BN formulation for example system in Fig. 13a obtained using the otimization algorithm with both heuristics.
M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 213

this may not be case. The BN obtained for this system using the 02, Pacific earthquake engineering research center, University of California,
optimization algorithm augmented by the heuristic of Section 7.2 Berkeley, March 2011.
[2] Bobbio A, et al. Improving the analysis of dependable systems by mapping
is shown in Fig. 19. The solution obtained is suboptimal. fault trees into Bayesian networks. Reliability Engineering & System Safety
It contains 29 links, whereas the optimal solution contains 26 2001;71(3):249–60.
links. The total clique size for this BN is 252 (as opposed to 184 for [3] Dechter R. Bucket elimination: a unifying framework for probabilistic
the optimal BN). However, using the Tomlab optimization envir- inference. Uncertainty in Artificial Intelligence 1996;UA1996:211–9.
[4] Der Kiureghian A, Song J. Multi-scale reliability analysis and updating of
onment [9], it took over 12 times longer to obtain a solution complex systems by use of linear programming. Reliability Engineering &
without the heuristic than when the heuristic was invoked. Thus, System Safety 2008;93(2):288–97.
in using the heuristic, there is a trade-off between the amount of [5] DSL. GeNIe 2.0 by Decision Systems Laboratory, Available at: /http://genie.
time required to solve the optimization problem and the optim- sis.pitt.edu/S 2007.
[6] Elias P, Feinstein A, Shannon C. A note on the maximum flow through a
ality of the resulting BN topology. However, even with the network. Information Theory, IRE Transactions on 1956;2(4):117–9.
heuristic, the efficient MCS formulation is substantially more [7] Ford LR, Fulkerson DR. Maximal flow through a network. Canadian Journal of
efficient than the standard MCS formulation. Mathematics 1956;8(3):399–404.
[8] Friis-Hansen P, Structuring of complex systems using Bayesian Networks. In
O. Ditlevsen & P. Friis-Hansen, eds. Proceedings of two part workshop at DTU.
Technical University of Denmark 2004.
8. Conclusions [9] Holmström K. Tomlab optimization environment, Available at: /http://
tomopt.com/tomlab/S, 2008.
This paper develops efficient BN formulations for modeling the [10] Hugin Expert A/S. Hugin researcher API 7.0, Denmark: Hugin expert A/S.
performance of general systems for which the MLSs or MCSs are Available at: /www.hugin.comS 2008.
[11] Jensen FV, Nielson TD. Bayesian networks and decision graphs. second ed.
known. We show that BNs with nodes in chain structures are New York: Springer Science þ Business Media, LLC; 2007.
more efficient than when nodes are arranged in converging [12] Lampis M, Andrews JD. Bayesian belief networks for system fault diagnostics.
topologies. We demonstrate how BNs with nodes arranged in Quality and Reliability Engineering International 2009;25(4):409–26.
[13] Langseth H, et al. Inference in hybrid Bayesian networks. Reliability Engineering
chain structures are constructed for series and parallel systems.
& System Safety 2009;94(10):1499–509.
This idea is then extended to develop similar topologies for [14] Lauritzen SL, Spiegelhalter DJ. Local computations with probabilities on
general systems. Additionally, the idea is extended to consider graphical structures and their application to expert systems. Journal of the
multi-state flow problems. To automate the construction of Royal Statistical Society. Series B (Methodological) 1988;50(2):157–224.
[15] Liu X, Li H & Li L. Building method of diagnostic model of Bayesian networks
efficient BN formulations for general systems, a binary integer
based on fault tree. In seventh international symposium on instrumentation
optimization program is developed with the goal of automatically and control technology: sensors and instruments, computer simulation, and
constructing the BN such that the number of links is minimized. artificial intelligence. Beijing, China: SPIE. 2008.
An example application highlights the advantage gained from the [16] Madsen AL. Belief update in CLG Bayesian networks with lazy propagation.
International Journal of Approximate Reasoning 2008;49(2):503–21.
efficient BN formulation. To improve computational efficiency, [17] Mahadevan S, Zhang R, Smith N. Bayesian networks for system reliability
two heuristic approaches are offered. One employs the concept of reassessment. Structural Safety 2001;23(3):231–51.
super components; the other reduces the number of component [18] Nielsen TD, Wuillemin P, Jensen FV, Kjaerulff U. Using ROBDDs for inference
permutations that need to be considered. Use of the second in Bayesian networks with troubleshooting as an example, Uncertainty in
artificial intelligence Proceedings, 2000, p. 426–435.
heuristic substantially reduces the size of the optimization [19] Page s A, Gondran M. System reliability. Springer-Verlag; 1986.
problem, but may result in a suboptimal BN topology. [20] Pearl J. Probabilistic reasoning in intelligent systems: networks of plausible
inference. The Morgan Kaufmann series in representation and reasoning. San
Mateo, Calif: Morgan Kaufmann Publishers; 1988.
Acknowledgment [21] Sarker RA, Newton CS. Optimization modelling: a practical approach. Boca
Raton, Florida: CRC Press, Taylor and Francis Group, LLC; 2008.
[22] Shachter RD. Evaluating influence Diagrams. Operations Research
This research was supported by the State of California through 1986;34(6):871–82.
the Transportation Systems Research Program of the Pacific [23] Straub D, Der Kiureghian A. Bayesian network enhanced with structural
reliability methods: methodology. Journal of Engineering Mechanics
Earthquake Engineering Research Center (PEER). Additional sup-
2010;136(10):1248–58 ASCE.
port was provided by the Taisei Chair in Civil Engineering at the [24] Straub D, Der Kiureghian A. Bayesian network enhanced with structural
University of California, Berkeley. The first author also gratefully reliability methods: application. Journal of Engineering Mechanics
acknowledges support from a National Science Foundation grad- 2010;136(10):1259–70 ASCE.
[25] Torres-Toledano J, Sucar L. Bayesian networks for reliability analysis of
uate research fellowship. Any opinions, findings, and conclusions complex systems. In Progress in artificial intelligence—IBERAMIA 98. Lecture
or recommendations expressed in this paper are those of the notes in computer science, vol. 1484. Springer-Verlag Berlin Heidelberg,
authors and do not necessarily reflect those of the funding 1998, p. 195–206.
agencies. [26] Yuan C, Druzdzel M. An importance sampling algorithm based on evidence
pre-propagation. In Proceedings of the 19th annual conference on Uncer-
tainty in Artificial Intelligence (UAI-03), 2003.
References [27] Yuan C, Druzdzel M. Importance sampling algorithms for Bayesian networks:
principles and performance. Mathematical and Computer Modelling
2006;43(9-10):1189–207.
[1] Bensi M, Der Kiureghian A, Straub D. A Bayesian network methodology for
infrastructure seismic risk assessment and decision support. Report no. 2011/

You might also like