Professional Documents
Culture Documents
System Modelling
System Modelling
a r t i c l e i n f o a b s t r a c t
Article history: The Bayesian network (BN) is a convenient tool for probabilistic modeling of system performance,
Received 14 February 2012 particularly when it is of interest to update the reliability of the system or its components in light of
Accepted 22 November 2012 observed information. In this paper, BN structures for modeling the performance of systems that are
Available online 12 December 2012
defined in terms of their minimum link or cut sets are investigated. Standard BN structures that define
Keywords: the system node as a child of its constituent components or its minimum link/cut sets lead to
Bayesian network converging structures, which are computationally disadvantageous and could severely hamper
Integer optimization application of the BN to real systems. A systematic approach to defining an alternative formulation
Max-flow min-cut theorem is developed that creates chain-like BN structures that are orders of magnitude more efficient,
Minimum cut sets
particularly in terms of computational memory demand. The formulation uses an integer optimization
Minimum link sets
algorithm to identify the most efficient BN structure. Example applications demonstrate the proposed
Parallel systems
Series systems methodology and quantify the gained computational advantage.
Systems Published by Elsevier Ltd.
to establish a table (called a potential), whose number of entries link sets (MLSs) and minimal cut sets (MCSs) for systems with
is equal to the product of the number of states of these variables. binary component and system states, but employ converging
In general, the sizes of the potentials over which summations are structures as in the naı̈ve formulation. It is shown that the MCS
performed determine the efficiency of the inference algorithm. formulation is also applicable to a certain class of systems with
The potentials, and consequently the efficiency of the inference multi-state components. We then develop two additional formu-
algorithm, depend on the ordering of node eliminations. There exist lations that employ MLSs/MCSs for systems with binary states, but
computationally optimal elimination sequences, all of which lead to result in chain-like BN topologies that are far more efficient for
the same domain set, i.e., the domains of the potentials arising in the computational purposes. These are first developed for series and
process are the same. The domains corresponding to the optimal parallel systems and then extended to general systems. The
elimination sequences are called cliques. The total size of the efficient MCS formulation is shown to be also applicable to a
potentials associated with these cliques is a good proxy for the certain class of systems with multi-state components.
computational effort required for performing inference in the BN
and is used in this paper to assess and compare efficiencies of
various BN system formulations.
4. BN system models using minimal link and cut sets
While all exact inference algorithms aim at finding the optimal
ordering of node eliminations, they follow different strategies for
4.1. Binary components and system
doing so. In particular, some algorithms optimize the elimination
for a specific inference task, while others, such as the junction tree
Consider a system with binary component and system states,
algorithm [11], optimize computations for general inference.
say survival/fail states. A minimal link set (MLS) is a minimum set
With the latter, parts of the computations are reused, which
of components whose joint survival constitutes survival of the
becomes efficient when the interest is in updated distributions of
system. The minimal link set BN formulation introduces intermedi-
many variables and when considering multiple evidence cases.
ate nodes between the component and system nodes, which
Our interest is more focused on general inference applications.
represent the states of the MLSs, as shown in Fig. 3. Torres-
Several of these algorithms are implemented in available software
Toledano and Sucar [25] used such a BN formulation for modeling
applications (e.g., [5,10]), facilitating inference in complex BNs.
system performance, though with less formality and generality
While this paper focuses on improving the computational
than described here. The binary states of the MLS nodes are
efficiency of exact inference algorithms, it is believed that the
defined such that each MLS node is in the survival state only if all
approaches developed here will also be useful for approximate
its constituent components have survived; otherwise, it is in the
algorithms by reducing the size of CPTs that must be stored.
fail state. The system node is in the survival state if any MLS node
We do not explore computational improvements that might be
is in the survival state. Let NMLS denote the number of MLSs of the
available for exact inference by consideration of deterministic
system and NMLS,i denote the number of components in the ith
substructures within the BN. As Nielsen et al. [18] have shown,
MLS. The size of the CPT of the ith MLS node is 2NMLS,i þ 1 , and the
advanced Boolean calculations can be used to improve the
size of the CPT of the system node is 2NMLS þ 1 . Clearly, when the
efficiency of exact algorithms when the deterministic part of a
number of MLSs is large, the size of the CPT associated with the
BN model is represented as a Boolean function. It is believed that
system node becomes large. A similar problem occurs for an MLS
such an approach can be used to further improve the computa-
node when the number of its constituent components is large.
tional efficiency of the BN model resulting from our topology
The dual of the MLS formulation is the minimal cut set BN
optimization scheme.
formulation. A MCS is a minimum set of components whose joint
failure constitutes failure of the system. In this formulation, the
system node is a child of nodes representing MCSs, and each MCS
3. Modeling system performance via Bayesian network
node is a child of nodes representing the states of its constituent
components, see Fig. 4. The system node is a series system of all the Nodes Ci in Fig. 4 are modified to represent multiple states
MCS nodes, (i.e., the system node is in the fail state if at least one MCS corresponding to the capacity levels of each component. If the
node is in the fail state), whereas each MCS is a parallel system of its component has a continuous capacity state, then the range of
parent nodes (i.e., all constituent components must be in the fail possible capacities must be discretized into several small inter-
state for the MCS node to be in the fail state). As with the MLS vals; in such a case, node Ci is said to represent an interval node.
formulation, the CPTs in this formulation become large as the Similarly, nodes MCSi have multiple states having capacity values
number of MCSs, denoted NMCS, increases and/or the number of defined using the relation
components in an MCS, denoted NMCS,i for the ith MCS, becomes large. X
CapMCSi ¼ Capj ð6Þ
C j A MCSi
Fig. 5. Equivalent BNs with (a) converging structure and (b) chain structure.
Fig. 6. Computational demands of system BNs with converging and chain topologies when components have (a) 2 states and (b) 5 states.
204 M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213
Fig. 6 compares the computational demands, measured in 5.2. Series and parallel systems with binary components
terms of the total clique sizes, for the BNs in Fig. 5 with
converging and chain structures, when the system components We now describe how the performance of systems with binary
have 2 and 5 states. As the number of components increase, the components can be modeled with BNs having the chain topology.
computational demand of the BN with converging structure Define a survival path sequence (SPS) as a chain of events, corre-
increases exponentially, while that of the BN with the chain sponding to a MLS, in which the terminal event in the sequence
structure increases linearly. However, for 2-state components, the indicates whether or not all the components in the MLS are in the
converging structure is more efficient than the chain structure survival state. Note that the term ‘‘sequence’’ does not have any
when the number of components is less than 4. Thus, when the temporal implications. A series system has one MLS and a parallel
node modeling system performance in Fig. 5a has more than system has Nc MLSs. It follows that a series system has one SPS and
3 parents (i.e., constituent components), it is advantageous to a parallel system has Nc SPSs. A SPS is comprised of a chain of
model the system as in Fig. 5b. survival path events (SPEs), each of which is associated with a
The computational demands associated with inference are component and describes the state of the sequence up to that
influenced not only by the system size and configuration, but event. SPEs are represented in the BN by nodes labeled Es,i, the
also by the number of common parents to the component nodes subscript i indicating the association with component i. The state of
(similar to node D in Fig. 5). Fig. 7 shows a comparison of Es,i is defined as
computational demands associated with the converging and
Es,i ¼ 1 if Es,PaðiÞ ¼ 1 \ fC i ¼ 1g
chain BN topologies with binary component nodes with 1, 2 and
3 common parent demand nodes. It is observed that increasing ¼0 otherwise ð8Þ
the number of common parent nodes increases the computational where Es,Pa(i) defines the state of the SPE node that is parent to Es,i;
demand. However, the chain structure remains advantageous to Es,i ¼ 1 indicates that the node is in the survival state and Es,i ¼0
the converging structure as the number of components increases. indicates its failure (we use this Boolean notation throughout this
Note that, as the number of common demand nodes increases, the paper). Thus, for a series system, the BN formulation takes the form
‘‘cut-off’’ point at which the chain structure is more efficient than shown in Fig. 8a. The state of node Es,1 is equal to the state of node
the converging structure moves slightly upward. For three com- C1. Es,2 is in the survival state only if Es,1 is in the survival state and
mon demand nodes, the chain structure is more efficient for 5 or C2 is in the survival state. This pattern continues such that Es,Nc is in
more components and for one common demand node, it is more the survival state only if both Es,Nc 1 and C Nc are in the survival
efficient for 4 or more components. state. Consequently, the state of Es,Nc describes the state of the
entire SPS (i.e., it indicates whether all components in the MLS have
survived) and, therefore, that of the series system. The state of
node Ssys is equal to the state of Es,Nc in Fig. 8a.
A parallel system has a SPS corresponding to each component.
The resulting BN formulation is shown in Fig. 8b. The system node
indicates system survival if any node Es,i is in the survival state.
Like the naı̈ve formulation, the exponential growth in the size of
the CPT associated with the system node renders this BN
intractable when the number of components is large.
Define a failure path sequence (FPS) as a chain of events,
corresponding to a MCS, in which the terminal event in the
sequence indicates whether or not all components in the MCS
are in the fail state. For a series system, there are Nc FPSs, one
corresponding to each component. For a parallel system, there is
only one MCS and thus one FPS. A FPS is comprised of a chain of
failure path events (FPEs), each of which is associated with a
component and gives the state of the sequence up to that event.
Let Ef,i be the node in the BN that represents the FPE associated
with component i. The state of Ef,i is defined as
Fig. 7. Comparison of computational demands associated with converging and
chain BN topologies for binary nodes with one or more common parent demand
Ef ,i ¼ 0 if Ef ,PaðiÞ ¼ 0 \ fC i ¼ 0g
nodes. ¼1 otherwise ð9Þ
Fig. 8. BN using SPEs to model performance of (a) series system, (b) parallel system.
M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 205
where Ef,Pa(i) defines the state of the FPE node that is parent to subscript corresponding to the associated component i and a
Ef,i. For a series system, the BN formulation using FPSs takes the superscript corresponding to the associated MLS j. The depen-
form shown in Fig. 9a, which has the undesirable converging dence between SPEs that share a component is modeled
structure. For a parallel system, the BN formulation takes the through a common parent node. The system node is in the
chain form shown in Fig. 9b. These findings suggest that a survival state if the terminal node of any SPS is in the survival
combination of SPS and FPS formulations can be used to state. For reference, the BN formulation in which the MLSs are
efficiently model general systems. This approach is described arranged in chain structures is named efficient MLS BN formula-
in the next section. tion. Similar logic leads to the creation of an efficient MCS BN
formulation, whereby strings of FPSs are constructed corre-
5.3. General systems with binary component states sponding to each MCS.
The dependence between SPEs or FPEs sharing a compo-
A MLS is a series system of its constituent components. nent increases the computational demand when performing
Therefore, using the above formulation, each MLS of the system inference in the BN. By coalescing common SPEs/FPEs that
can be described by an SPS, resulting in a chain-like BN appear in multiple SPSs/FPSs, the number of nodes and links in
structure. Consider the example system in Fig. 10a, which has the BN, and hence the computational demand, are reduced. In
four MLSs: MLS1 ¼{1,7,8}, MLS2 ¼{2,7,8}, MLS3 ¼{3,7,8} and the example system, components 7 and 8 appear in all SPSs.
MLS4 ¼{4,5,6,7,8}. In Fig. 10b each MLS is modeled as an We take advantage of this observation and introduce only one
individual SPS. The SPEs, Ejs,i , in each SPS are indexed by a ‘‘instance’’ of the SPEs associated with these components. The
Fig. 9. BN using FPEs to model performance of (a) series system and (b) parallel system.
Fig. 10. (a) Example system and (b) efficient MLS formulation with distinct SPSs.
206 M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213
Fig. 11. Efficient MLS formulations for the example system with coalesced SPEs associated with components 7 and 8 using (a) a converging structure (b) a chain structure.
SPEs only, the possibility to combine SPEs and FPEs is not Third, there are two constraints governing the arrangement
considered. Such a combination can be performed as an addi- of the SPE nodes in the BN: (a) each MLS must be represented by
tional step after the optimization of the SPEs (or FPEs), similar to a SPS, and (b) no SPS may exist that is not strictly a MLS.
the example shown in Fig. 11b. Violation of the first constraint results in exclusion of one or
more MLSs, causing underestimation of the system reliability.
Violation of the second constraint results in a BN that includes
6. Optimal ordering of survival path events one or more fictitious MLSs, thus causing overestimation of the
system reliability.
The aim of this section is to formalize the problem of finding Constraint (a) requires that each MLS be represented as a SPS, i.e.,
the optimal arrangement of SPEs in SPSs for a general system. Let at least one permutation of the SPEs associated with the components
L(im,jn) ¼1 indicate the existence of a directed link from node Em in the MLS must be connected as a chain. Let NMLS,i denote
s,i
to node Ens,j in the efficient MLS BN formulation and L(im,jn) ¼0 the number of components in MLSi. For the example system in
indicate the absence of such a link, where i and j are component Fig. 10a, we have NMCS,1 ¼NMCS,2 ¼NMCS,3 ¼3 and NMCS,4 ¼ 5. Let Pi
indices and m and n are indices denoting the instances of these denote the set of permutations, without replacement, of the
SPE nodes in the BN. Also, let C m component indices in MLSi and define pai ¼ fpai,1 , pai,2 ,. . .,pai,NMCS,i g as
i ¼ 1 indicate a directed link
between the node representing component i and node Em its ath member. As an example, for the system in Fig. 10a, we have
s,i and
Sm m P1 ¼ p11 ¼ ð1,7,8Þ, p21 ¼ ð1,8,7Þ, p31 ¼ ð8,1,7Þ, p41 ¼ ð7,1,8Þ, p51 ¼
i ¼ 1 indicate a directed link between Es,i and the system node
(with C m m ð7,8,1Þ, p61 ¼ ð8,7,1Þg.
i ¼ 0 and Si ¼ 0, respectively denoting their absences).
The decision variables in the optimization problem are the links Next, let Qi denote the set of permutations with replacement of
between the SPE nodes, L(im,jn). The remaining links, C m m NMCS,i draws from the index set f1,. . ., N I g and define qbi ¼ fqbi,1 ,
i and Si ,
m n
follow from the L(i ,j ), as described later. Formulation of this qbi,2 ,. . .,qbi,NMLS,i g as its bth member. Using the example in Fig. 10a and
optimization problem assumes the use of only SPE nodes as assuming NI ¼2, we have Q 1 ¼ q11 ¼ ð1,1,1Þ, q21 ¼ ð1,1,2Þ, q31 ¼
defined in Eq. (10) and a converging structure at the system ð1,2,1Þ, q41 ¼ ð1,2,2Þ, q51 ¼ ð2,1,1Þ, q61 ¼ ð2,1,2Þ, q71 ¼ ð2,2,1Þ, q81 ¼
node. To further increase computational efficiency of the resulting ð2,2,2Þg. Note that Pi has NMLS,i! members, while Qi has NI MLS,i
N
BN, the converging structure at the system or any other node can
members.
be replaced by a chain structure by use of FPEs in the manner
Define the set r ai , b ¼ ½r ai,1, b , r ai,2, b ,. . .,r ai,N, bMLS,i , which combines the
described in Fig. 11.
Using the number of links in the BN as a proxy for computa- elements of pai and qbi . Specifically, r ai , b includes the component
tional demands required when performing inference, the objec- indices in pai with superscripts specified according to qbi . For the
tive of the optimization problem is to minimize the number of example system, r 1,1 1 1 1 1,2 1 1 2 2,4 1 2 2
1 ¼ f1 ,7 ,8 g, r 1 ¼ f1 ,7 ,8 g, r 1 ¼ f1 ,8 ,7 g,
links in the BN. This is formulated as etc. Overall, for this particular MLS, there are 3!*23 ¼48 possible
2 3 ways to arrange the component indices and the instance super-
X
Nc XNc X NI XNI NI NI
m n X Nc X
m
XNc X
m
min4 L i ,j þ Ci þ Si 5 ð12Þ scripts.
i¼1j¼1m¼1n¼1 i¼1m¼1 i¼1m¼1 For convenience, define the sum
going into or out of it can be removed from the BN.) Mathematically, ð16Þ
this is formulated as a constraint on the optimization problem,
written as
2 3 where,Zis used rather than equality for convenience of the
XNc X NI
m n n m optimization algorithm.
4 L i ,j þL j ,i Z 15 ) C m
i ¼1 ð13Þ Constraint (b) requires that no SPS exist in the BN that does
j¼1n¼1 not correspond to a MLS. Consider the BN segment shown in
Fig. 12a. Let the shaded nodes (E1s,1 -E1s,2 -E1s,3 -E1s,4 ) represent a
Second, if Ems,i exists and has no other SPE node as a child, then
particular permutation of component/instance indices r ði a, bÞ ¼
it is a terminal node in a SPS. Such a node must have a link to the
f11 ,21 ,31 ,41 g resulting in a valid SPS. Constraint (b) must pro-
system node, i.e., Sm i ¼ 1. This leads to the second constraint on
hibit a SPE Ens,j , for any n, from ‘‘branching-off’’ the SPS at any
the optimization problem, written as
2 3 2 3 node, i.e., being a child of any node in the chain, unless
XNc X NI
n m Nc X
X NI
m n component j exists in a MLS with all the preceding components
4 L j ,i Z1 \ 5 4 L i ,j ¼ 05 ) Smi ¼1 ð14Þ in the sequence. For example, in Fig. 12a, Ens,j cannot exist as a
j¼1n¼1 j¼1n¼1
child of E1s,3 unless components 1,2,3 and j exist together in a
Well known techniques are available for modeling ‘‘if-then’’ MLS. If components 1,2,3 and j do not exist in a MLS, then the
propositions, as in the preceding two equations, into constraints false survival path shown by nodes with dashed edges is introdu-
in numerical optimization, e.g., see Sarker and Newton [21]. ced into the BN. The associated constraints for all valid SPSs are
208 M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213
Fig. 13. (a) Example network system; (b) efficient MLS BN formulation with one SPS highlighted and (c) BNs showing SPSs corresponding to remaining MLSs.
M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 209
Fig. 14. System in Fig. 10a with component sets (C4, C5, C6) and (C7, C8), respectively replaced by super components SC1 amd SC2.
Fig. 15. System in Fig. 14 with component (C1, C2, C3, SC1) replaced by a super component.
mA,p
j ¼ 2i Mpi,j ð23Þ
i¼1
¼0 otherwise ð24Þ
Fig. 17. Example system illustrating non-contiguous components that can be
combined into a super component. where C pgrp
is the set of components that were grouped to form
the new super component. We perform this operation repeatedly
to formation of MLSs and MCSs, they have the same effect as if until all super components of Class A are formed. For the example
they physically existed in series. system in Fig. 10a, using an MLS formulation, two super compo-
We now present an algorithm for sequential identification and nents of Class A are identified and the updated matrices M1 and
replacement of elementary components by super components, or M2 are as shown in the middle of Fig. 18.
sets of super components by higher level super components. The second class of super components, Class B, comprises
The first step in the algorithm is construction of an initial components that appear in different MLSs (MCSs), but share these
‘‘correspondence’’ matrix M0 that contains a row corresponding MLSs with the same set of other components. For a MLS (MCS)-
to each MLS (MCS) and a column corresponding to each elemen- based formulation, these correspond to components in parallel
tary component. The elements M 0ij of this matrix are defined by (series). To identify such super components in the pth iteration of
the algorithm, we assign to each component (or previously
M 0i,j ¼ 1 if component j is a member of MLS ðMCSÞ i formed super component) j the quantity mB,p defined by
j
¼0 otherwise ð22Þ 2 0 13
X X k p
mB,p ¼ 4M p @ 2 Mi,k A5 ð25Þ
For the example system in Fig. 10a, matrix M0 is as given at the j
i
i,j
kaj
top of Fig. 18. In each subsequent step of the algorithm, the
correspondence matrix is updated by eliminating columns corre- One can easily verify that components (or super components) that
sponding to components that are grouped into a super compo- have identical mB,p
j
values satisfy the above conditions for a Class
nent, and creating a new column to represent the new super B super component and can be so grouped. As an example, for the
component. Let Mp denote the correspondence matrix in the pth system in Fig. 10a, we have mB,2 B,2 B,2 B,2
1 ¼ m2 ¼ m3 ¼ mSC 1 ¼ 32. Matrix
step of the algorithm with its elements denoted M pi,j . p
M is now updated by removing columns corresponding to the
Two types of super components are identified. Class A super grouped components and adding a column for the new super
components are made up of groups of components (or previously component with elements defined by Eq. (24). Since the
M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 211
Fig. 18. Correspondence matrices of example system before and after identification and formation of Class A and Class B super components.
combined components come from different MLSs (MCSs), this Component Number of appearances in a MLS
process renders some rows of the matrix zero, which can be
removed. For the example system, this process leads to the 1 5
updated correspondence matrix M3, which is shown in the 2 3
bottom of Fig. 18. 3 2
The above iterative procedure for finding and replacing com- 4 3
ponents with super components of Class A and Class B is repeated 5 3
until no super components remain. The matrix Mp that corre- 6 1
sponds to the last iteration is then used to specify the components 7 3
and the corresponding MLSs or MCSs required for defining the 8 1
optimization problem. 9 2
Define g 0i as the set gi,k which has the largest cardinality: For i¼5, MLS5 ¼ {1,5,7}:
Fig. 19. Efficient MCS BN formulation for example system in Fig. 13a obtained using the otimization algorithm with both heuristics.
M. Bensi et al. / Reliability Engineering and System Safety 112 (2013) 200–213 213
this may not be case. The BN obtained for this system using the 02, Pacific earthquake engineering research center, University of California,
optimization algorithm augmented by the heuristic of Section 7.2 Berkeley, March 2011.
[2] Bobbio A, et al. Improving the analysis of dependable systems by mapping
is shown in Fig. 19. The solution obtained is suboptimal. fault trees into Bayesian networks. Reliability Engineering & System Safety
It contains 29 links, whereas the optimal solution contains 26 2001;71(3):249–60.
links. The total clique size for this BN is 252 (as opposed to 184 for [3] Dechter R. Bucket elimination: a unifying framework for probabilistic
the optimal BN). However, using the Tomlab optimization envir- inference. Uncertainty in Artificial Intelligence 1996;UA1996:211–9.
[4] Der Kiureghian A, Song J. Multi-scale reliability analysis and updating of
onment [9], it took over 12 times longer to obtain a solution complex systems by use of linear programming. Reliability Engineering &
without the heuristic than when the heuristic was invoked. Thus, System Safety 2008;93(2):288–97.
in using the heuristic, there is a trade-off between the amount of [5] DSL. GeNIe 2.0 by Decision Systems Laboratory, Available at: /http://genie.
time required to solve the optimization problem and the optim- sis.pitt.edu/S 2007.
[6] Elias P, Feinstein A, Shannon C. A note on the maximum flow through a
ality of the resulting BN topology. However, even with the network. Information Theory, IRE Transactions on 1956;2(4):117–9.
heuristic, the efficient MCS formulation is substantially more [7] Ford LR, Fulkerson DR. Maximal flow through a network. Canadian Journal of
efficient than the standard MCS formulation. Mathematics 1956;8(3):399–404.
[8] Friis-Hansen P, Structuring of complex systems using Bayesian Networks. In
O. Ditlevsen & P. Friis-Hansen, eds. Proceedings of two part workshop at DTU.
Technical University of Denmark 2004.
8. Conclusions [9] Holmström K. Tomlab optimization environment, Available at: /http://
tomopt.com/tomlab/S, 2008.
This paper develops efficient BN formulations for modeling the [10] Hugin Expert A/S. Hugin researcher API 7.0, Denmark: Hugin expert A/S.
performance of general systems for which the MLSs or MCSs are Available at: /www.hugin.comS 2008.
[11] Jensen FV, Nielson TD. Bayesian networks and decision graphs. second ed.
known. We show that BNs with nodes in chain structures are New York: Springer Science þ Business Media, LLC; 2007.
more efficient than when nodes are arranged in converging [12] Lampis M, Andrews JD. Bayesian belief networks for system fault diagnostics.
topologies. We demonstrate how BNs with nodes arranged in Quality and Reliability Engineering International 2009;25(4):409–26.
[13] Langseth H, et al. Inference in hybrid Bayesian networks. Reliability Engineering
chain structures are constructed for series and parallel systems.
& System Safety 2009;94(10):1499–509.
This idea is then extended to develop similar topologies for [14] Lauritzen SL, Spiegelhalter DJ. Local computations with probabilities on
general systems. Additionally, the idea is extended to consider graphical structures and their application to expert systems. Journal of the
multi-state flow problems. To automate the construction of Royal Statistical Society. Series B (Methodological) 1988;50(2):157–224.
[15] Liu X, Li H & Li L. Building method of diagnostic model of Bayesian networks
efficient BN formulations for general systems, a binary integer
based on fault tree. In seventh international symposium on instrumentation
optimization program is developed with the goal of automatically and control technology: sensors and instruments, computer simulation, and
constructing the BN such that the number of links is minimized. artificial intelligence. Beijing, China: SPIE. 2008.
An example application highlights the advantage gained from the [16] Madsen AL. Belief update in CLG Bayesian networks with lazy propagation.
International Journal of Approximate Reasoning 2008;49(2):503–21.
efficient BN formulation. To improve computational efficiency, [17] Mahadevan S, Zhang R, Smith N. Bayesian networks for system reliability
two heuristic approaches are offered. One employs the concept of reassessment. Structural Safety 2001;23(3):231–51.
super components; the other reduces the number of component [18] Nielsen TD, Wuillemin P, Jensen FV, Kjaerulff U. Using ROBDDs for inference
permutations that need to be considered. Use of the second in Bayesian networks with troubleshooting as an example, Uncertainty in
artificial intelligence Proceedings, 2000, p. 426–435.
heuristic substantially reduces the size of the optimization [19] Page s A, Gondran M. System reliability. Springer-Verlag; 1986.
problem, but may result in a suboptimal BN topology. [20] Pearl J. Probabilistic reasoning in intelligent systems: networks of plausible
inference. The Morgan Kaufmann series in representation and reasoning. San
Mateo, Calif: Morgan Kaufmann Publishers; 1988.
Acknowledgment [21] Sarker RA, Newton CS. Optimization modelling: a practical approach. Boca
Raton, Florida: CRC Press, Taylor and Francis Group, LLC; 2008.
[22] Shachter RD. Evaluating influence Diagrams. Operations Research
This research was supported by the State of California through 1986;34(6):871–82.
the Transportation Systems Research Program of the Pacific [23] Straub D, Der Kiureghian A. Bayesian network enhanced with structural
reliability methods: methodology. Journal of Engineering Mechanics
Earthquake Engineering Research Center (PEER). Additional sup-
2010;136(10):1248–58 ASCE.
port was provided by the Taisei Chair in Civil Engineering at the [24] Straub D, Der Kiureghian A. Bayesian network enhanced with structural
University of California, Berkeley. The first author also gratefully reliability methods: application. Journal of Engineering Mechanics
acknowledges support from a National Science Foundation grad- 2010;136(10):1259–70 ASCE.
[25] Torres-Toledano J, Sucar L. Bayesian networks for reliability analysis of
uate research fellowship. Any opinions, findings, and conclusions complex systems. In Progress in artificial intelligence—IBERAMIA 98. Lecture
or recommendations expressed in this paper are those of the notes in computer science, vol. 1484. Springer-Verlag Berlin Heidelberg,
authors and do not necessarily reflect those of the funding 1998, p. 195–206.
agencies. [26] Yuan C, Druzdzel M. An importance sampling algorithm based on evidence
pre-propagation. In Proceedings of the 19th annual conference on Uncer-
tainty in Artificial Intelligence (UAI-03), 2003.
References [27] Yuan C, Druzdzel M. Importance sampling algorithms for Bayesian networks:
principles and performance. Mathematical and Computer Modelling
2006;43(9-10):1189–207.
[1] Bensi M, Der Kiureghian A, Straub D. A Bayesian network methodology for
infrastructure seismic risk assessment and decision support. Report no. 2011/