Yu Et Al-2017-Risk Analysis

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Risk Analysis, Vol. 37, No. 9, 2017 DOI: 10.1111/risa.

12736

A Flexible Hierarchical Bayesian Modeling Technique


for Risk Analysis of Major Accidents

Hongyang Yu,1,2 Faisal Khan,1,2,∗ and Brian Veitch1

Safety analysis of rare events with potentially catastrophic consequences is challenged by data
scarcity and uncertainty. Traditional causation-based approaches, such as fault tree and event
tree (used to model rare event), suffer from a number of weaknesses. These include the static
structure of the event causation, lack of event occurrence data, and need for reliable prior
information. In this study, a new hierarchical Bayesian modeling based technique is proposed
to overcome these drawbacks. The proposed technique can be used as a flexible technique for
risk analysis of major accidents. It enables both forward and backward analysis in quantitative
reasoning and the treatment of interdependence among the model parameters. Source-to-
source variability in data sources is also taken into account through a robust probabilistic
safety analysis. The applicability of the proposed technique has been demonstrated through
a case study in marine and offshore industry.

KEY WORDS: Event tree; fault tree; hierarchical Bayesian modeling; major accidents; probabilistic risk
analysis

1. INTRODUCTION niques can be used for safety analysis, the focus of


the former is on isolating the potential causes of an
Fault tree analysis and event tree analysis are
undesired event, and the latter on identifying possi-
two popular techniques used for safety analysis. A
ble consequences.(1)
fault tree has a converging structure that links a num-
Fault tree analysis can be used as a qualitative
ber of basic events to a top event. The relationships
tool to assist in creation of a diagnostic manual for
between the basic events and top event are modeled
complex systems.(2) For quantitative analysis, the ba-
using logic gates. However, the event tree has a di-
sic events of the fault tree are assumed to be statisti-
verging structure relating an initial event to its vari-
cally independent. The probabilities of occurrence of
ous consequences. Each consequence is the result of
these basic events can be estimated from past failure
a particular combination of states of the safety bar-
data or based on expert knowledge. Upon obtaining
riers following the initial event. Although both tech-
these probabilities, the probability of the top event
1 Centre
can be calculated by applying Boolean algebra se-
for Risk, Integrity and Safety Engineering (CRISE), Fac-
ulty of Engineering & Applied Science, Memorial University of
quentially on each gate of the whole tree structure
Newfoundland, St John’s, NL, Canada. or on the minimum cut set.(3) Because of the static
2 National Centre for Maritime Engineering and Hydrodynamics, structure and the unidirectional property of the logic
Australian Maritime College, University of Tasmania, Launces- gates of the fault tree, the probability updates of the
ton, TAS, Australia. basic events through backward information propa-
∗ Address correspondence to Faisal Khan, Centre for Risk, In-

tegrity and Safety Engineering (CRISE), Faculty of Engineer- gation from the top event is not possible.(4,5) An-
ing & Applied Science, Memorial University of Newfound- other major limitation of such an analysis exists if
land, St John’s, NL, Canada A1B 3xS; tel: +1 709 864 8939; the top event is a major accident with extremely low
fikhan@mun.ca.

1668 0272-4332/17/0100-1668$22.00/1 
C 2017 Society for Risk Analysis
Risk Analysis of Major Accidents 1669

frequency of occurrence. The data samples for the update the probability of each consequence occur-
basic events might be sparse, leading to highly biased ring; the reverse is not possible.(11,12) For the same
estimations. Consequently, the computed occurrence reason, the estimation of occurrence probability of a
probability of the top event might not represent the major accident given the occurrence of its precursory
real situation. events using backward analysis is not possible either.
Estimating the probability of occurrence of ma- To address the above limitations of the fault
jor accidents is an indispensable element of prob- tree and event tree analysis, several researchers have
abilistic risk analysis and has become an active proposed to convert both models into a Bayesian
research direction in recent years.(6,7) Major acci- network (BN) model.(5,13,14) In this particular
dents are defined as low-frequency events causing conversion, the initial event, safety barriers, and
fatalities and catastrophic environmental or capi- consequences of the event tree are modeled as
tal losses. Conventional probability estimation tech- root node, intermediate nodes, and leaf nodes,
niques, whether they are parametric or nonpara- respectively. The qualitative relationships between
metric, rely heavily on availability of data samples. these nodes in the Bayesian network are extracted
The estimated probability asymptotically approaches from the event tree diagram. The quantitative rela-
the true probability as the number of data samples tionships are represented as conditional probability
increases.(8) However, this property is not applica- tables (CPTs). The conversion of a fault tree into a
ble to probability estimation of major accidents due BN follows a similar procedure: the basic events are
to their low frequency of occurrence: the number the root nodes and the top event is the leaf node.
of major accidents may not be adequately large to One of the major advantages of such a conversion is
yield unbiased and realistic probability estimation. that both forward and backward analysis are permit-
The use of precursor-based probability estimation ted in BN. This enables the update of probabilities of
that accounts for the number of occurrences of the safety barriers and basic events given the number of
precursory events of the major accidents has been occurrences of the consequences and the top event,
proposed to overcome this limitation.(9,10) respectively.
A major accident and its precursors are con- The probability updating performance of BN de-
sidered to be consequences evolving from the same pends on the accuracy of prior probability distribu-
initial event in the context of present work. The tion of the root nodes and the reasonableness of the
precursory events belong to the consequences of CPTs. Normally, these two sets of parameters are es-
the initial event if at least one safety barrier is in timated from data or given by expert judgment. In
its working state. However, a major accident is the the first case, data samples for the root nodes are as-
consequence of the initial event when all safety sumed to be observed without uncertainty. However,
barriers have failed. In this respect, the relationships this assumption rarely holds in practice. It is often the
between the initial event, safety barriers, and the case that data samples collected under limited condi-
final consequences can be represented using an tions do not contain enough information to allow for
event tree diagram. To obtain the probability of good generalization characteristics. To counteract
occurrence of each consequence, a forward analysis this problem, collecting data samples from sources
is conducted on the event tree, which requires the with varying conditions is necessary. This process
probability (or rate) of occurrence of the initial event introduces inevitable uncertainty in data samples,
and the probability of failure of each safety barrier. known as the source-to-source variability.(14) Tradi-
Compared to a major accident, the initial event may tional Bayesian modeling is not able to handle such
have a higher occurrence frequency, making it possi- uncertainty. In the second case, there is also inher-
ble to estimate its probability through conventional ent uncertainty associated with expert judgment, the
statistical methods such as maximum likelihood rationality of which is subjected to background, train-
estimation (MLE). However, the probabilities of ing, and experience.
failure of the safety barriers are difficult to obtain A hierarchical Bayesian modeling (HBM) tech-
because the number of occurrences of each conse- nique is proposed to cope with source-to-source vari-
quence dictates them, which could be too small (in ability in data samples.(15,16) In HBM, an additional
the case of major accident) for a reliable estimation. level of Bayesian modeling is imposed on the pa-
Furthermore, similar to the fault tree, the event tree rameters of a base distribution. More specifically,
model is static, allowing only forward analysis, that the parameters of a base distribution are considered
is, information can only flow from the initial event to to be drawn from a prior distribution governed by
1670 Yu, Khan, and Veitch

a set of hyper parameters. These hyper parameters eling of arctic shipping is proposed in the second case
are also randomly generated from a noninformative study. Finally, the major findings and conclusions of
distribution. A prior distribution with its hyper pa- this study are summarized in Section 5. In addition,
rameters drawn from a noninformative distribution directions for future work are outlined.
is called a noninformative prior. The noninformative
prior is used to ensure uncertainty in data samples is
2. BACKGROUND
modeled in the posterior distributions without bias.
In this case, the updated posterior distributions are There are two common ways of estimating the
also known as the informative posteriors. To obtain parameters of a probability distribution from data
informative posteriors, data samples are first incor- samples, namely, the MLE and the Bayesian MLE.
porated into a likelihood function. In this work, a MLE assumes that the observed data samples can
multivariate likelihood function is proposed for both only be generated from a single probability distri-
fault tree and event tree. Model parameters of the bution with a fixed parameter. This parameter is
fault tree and event tree are also jointly modeled obtained as the one that maximizes the likelihood
in the likelihood function. The noninformative prior of the data samples under the given probability
and the multivariate likelihood function are then distribution. However, Bayesian MLE considers a
combined using Bayes’s rule to produce the infor- number of candidate probability distributions whose
mative posteriors of the model parameters. Subse- parameters are sampled from another generic dis-
quently, the expected values of model parameters tribution, known as the prior. In this case, the op-
with respect to their corresponding informative pos- timal parameter is obtained as the one that maxi-
teriors are computed. These expected values are then mizes the joint likelihood of the data samples and the
fed back to their base distributions to predict the ex- prior. A graphic illustration based on the Venn dia-
pected number of occurrences of undesired events in gram is provided in Fig. 1 (a) and (b) to demonstrate
the next time interval. the difference between MLE and Bayesian MLE,
There are three major advantages of the pro- where D represent the data samples, θ is the param-
posed technique. (1) Model parameters of the event eter of interest, and  is the sample space for θ . It
tree and fault tree are modeled in a joint likeli- is noted that for MLE, p(θ̄) = 1, indicating there is
hood function such that the interdependence be- only one probability distribution with parameter θ̄
tween these parameters is fully explored, leading that could explain D. This often leads to a data over-
to more realistic probability estimations of the top fitting problem. For Bayesian MLE, there are many
events and the consequences. (2) The use of joint possible probability distributions with their parame-
likelihood function also precludes the need of a BN ters sampled from  and P() = 1. The data overfit-
to model parameter interdependence. This also as- ting problem is effectively avoided by exploring the
sists in reducing the uncertainty of creating CPTs entire sample space of θ .
based on expert knowledge. Meanwhile, both for- Although Bayesian MLE is effective in model-
ward and backward analysis are also permitted. (3) ing uncertainty in θ , it is not able to deal with un-
Source-to-source variability of the data samples is ef- certainty in D. In fact, both MLE and Bayesian as-
fectively incorporated in the modeling to further re- sume that all data samples are collected under strictly
duce the uncertainty in estimation. In summary, the consistent conditions—they are generated from the
proposed technique provides a flexible and universal same probability distribution. However, this is rarely
framework to extend the capability of both event tree true in practice, particularly for accident modeling,
and fault tree, by enabling bidirectional analyses and in which data samples are preferred to be collected
handling of data uncertainty. from different sources to cover a broad spectrum of
The remaining parts of this article are organized scenarios. This also implies that data samples for rare
as follows. The mechanism of the HBM is first in- accident modeling might be generated from different
troduced in Section 2. The HBM of the fault tree distributions.
and event trees are illustrated in detail in Section 3. To cope with source-to-source variability in data,
In Section 4, the proposed technique is applied to a two-stage Bayesian procedure was first proposed in
two case studies in marine and offshore operations. the work of Kaplan,(17,18) which was also the prelim-
The first case study focuses on verifying the applica- inary form of the HBM. Since then, much develop-
bility of the proposed technique using real industrial ment has been done to improve the performance and
data, whereas a general framework for accident mod- extend the capability of this original form. In recent
Risk Analysis of Major Accidents 1671

(a) (b) (c)


p(θ) p (θ , D | Θ) P(Θ) p (θ , D | α , β ) P(Α,Β)
l(D|θ) l(D|Θ) p(θ|Θ) l(D|θα,β) p(θ|α,β)

α ∈Α
θ ∈Θ β ∈Β

θ MLE = arg max l ( D | θ )


θ
θ Bayesian = arg max l ( D,θ | Θ)
θ
p (θ | D) = Eα ,β P ( Α ,Β ) [ p(θ | α , β ) p(α , β | D)]

Fig. 1. Comparison of MLE, Bayesian MLE, and HBM.

years, with the development of advanced sampling likelihood functions. In most cases, the derivation of
techniques such as the Markov Chain Monte Carlo Jeffrey’s prior for complex and multivariate likeli-
(MCMC) simulation, the improved HBM has be- hood function ends up to be intractable. A diffuse
come more capable of handling complex likelihood gamma prior has been proposed in the work of Kelly
functions. Despite the state-of-art development, the et al.(21) and Yan et al.(22) as an alternative to Jeffrey’s
fundamental principle of the HBM remains the same prior for complex likelihood function. In this study,
and is briefly introduced in the ensuing paragraphs. this diffuse gamma prior is used as the noninforma-
Similar to Bayesian MLE, HBM also models tive prior for modeling data uncertainty.
the uncertainty of data samples in the prior distri- The noninformative prior can be updated using
bution of θ , by means of sampling hyper parame- data D to form an informative posterior of the pa-
ters of θ from a noninformative distribution. Specif- rameter of interest.(23) This informative posterior is
ically, as shown in Fig. 1(c), if p(θ |α, β) is the prior derived through three basic steps. In the first step,
distribution of θ , α and β are the hyper parame- the likelihood function of the hyper parameters is
ters and are sampled from a noninformative distri- obtained by computing the expectation of the likeli-
bution, P(A, B). A noninformative distribution is a hood function l(D| θ ) with respect to the parameter
probability distribution that does not give prefer- of interest, θ .
ence to generation of data samples within any par- 
ticular range. This enables a wide range of α and β l(D| α, β) = l(D| θ ) p(θ | α, β)∂θ (1)
values to be generated, making p(θ |α, β) as generic
as possible to cover all possible data generation One of the major focuses of this study is to con-
sources/distributions. More importantly, when used struct a multivariate from of l(D|θ ) for both fault tree
for Bayesian updating, a noninformative prior does and event tree so that all the parameters are jointly
not have a strong influence on its posterior distri- modeled. Upon acquiring the likelihood function of
bution. This forces the Bayesian update to be com- the hyper parameters, the posterior distribution of
pletely dependent on data. The resulting posterior the hyper parameters is determined through Bayes’s
distribution not only takes into account the uncer- theorem.
tainty in data but also accurately reflects their true p(α, β)l(D| α, β)
nature. p(α, β | D) =   (2)
p(α, β)l(D| α, β)∂α∂β
The uniform distribution is typical choice of non-
informative distribution for hyper parameters, due It is noted that the double integrals in the de-
to its assignment of equal probability to all values nominator might be intractable. This issue can be ad-
within a certain range. There are two major issues dressed by first applying MCMC to sample α and
associated with the use of uniform distribution as a β from their joint distribution p(α, β). Then, the
noninformative distribution. First, the support of the integrals are approximated by the sample mean of
uniform distribution is finite, allowing only samples l(D|α, β). In the third step, the posterior distribu-
within a certain range to be generated; data gener- tion of θ given data, p(θ |D), is computed through
ation is biased. Second, the uniform distribution is marginalizing over α and β.
not invariant under reparameterization, which vio- 
lates the Jeffrey rule of noninformative prior.(19) non- p(θ | D) = p(θ |α, β) p(α, β | D)∂α∂β (3)
informative priors satisfying Jeffrey’s rule are known
as the Jeffrey’s prior.(20) There is only a limited num- Likewise, the solution of the double integrals
ber of Jeffrey’s priors available for some well-known could be approximated in a similar way by calculating
1672 Yu, Khan, and Veitch

p (θ | D)

∫∫
α , β p (α , β | D )

3 1
Fig. 2. Graphic illustration of HBM procedure.
p (α , β | D) p (θ | α , β ) p( D | θ )


θ

2
∫∫
α , β ~ p (α , β )
p( D | α , β ) p (α , β )

the sample mean of p(θ |α, β). The posterior distribu-


tion is also referred to as the informative posterior of
θ . The complete HBM procedure for obtaining the
informative posterior of θ is also illustrated in Fig. 2.
In addition, the above procedure can be formu-
lated into a recursive Bayesian estimation problem
for sequentially arriving new data, Dt :
p(θ |D) p(Dt |θ )
p(θ |Dt , D) =  , (4)
p(θ |D) p(Dt |θ )∂θ

where p(Dt |θ ) is recomputed for every time interval Fig. 3. Fault tree example.
t between which new data samples are collected.

3. METHODOLOGY dent of each other. The above limitations of fault tree


in quantitative reasoning can be substantially relaxed
using the HBM approach. This is demonstrated in the
3.1. HBM of Fault Tree
following example where a simple fault tree is consid-
A conventional fault tree has a converging struc- ered.
ture that describes how a group of basic events can The fault tree structure in Fig. 3 has five model
lead to a top event. This structure enables qualitative parameters, including the probabilities of occurrence
reasoning of causality between basic events and top of the basic events (θi , i ∈ {1, 2, 3, 4}) and the top
event; both forward and backward analysis can be event π . The relationship between these model pa-
conducted. For quantitative reasoning, however, sta- rameters can be expressed analytically by applying
tistical information is only allowed to flow from the Boolean algebra on the logic gates.
basic events to the top event. In addition, to calcu-
π = θ1 θ2 (θ3 + θ4 − θ3 θ4 ) (5)
late the probability of occurrence of a top event, the
probabilities of occurrence of the basic events have It is assumed that the only data available for
to be either estimated from historical data samples or estimating these parameters is the number of oc-
specified by expert knowledge. In the case that there currences of the top event in a specific time inter-
is only data available for the top event, the proba- val for a total of T consecutive time intervals, D =
bilities of occurrence of the basic events cannot be {n1 , n2 , . . . , nt=T }, where nt is the number of occur-
estimated using backward analysis. Furthermore, the rences of the top event in tth time interval. It is also
basic events are assumed to be statistically indepen- assumed that the total number of trials for each time
Risk Analysis of Major Accidents 1673

interval is the same and is denoted as N. Putting this This joint likelihood function is then used to
in the context of safety analysis, nt is the number of compute the joint likelihood function of the hyper
accidents in a specific time period, i.e., a year, while N parameters.
is the total number of operations in the same period. 
Because of the limitation of the fault tree, the estima- p(D| α, β) = p(D| θ) p(θ | α, β)∂θ (10)
tion of the model parameters θi , i ∈ {1, 2, 3, 4}, given
only the data of the top event, is not possible. The integral in Equation (10) is overloaded to
The above parameter estimation problem can be simplify the notations. As described in Section 2, this
formulated into the HBM framework for an easy overloaded integral can be solved by calculating the
solution. In this formulation, the basic events and sample mean of p(D|θ). The samples of θ are gen-
the top event of the fault tree are considered to erated from MCMC simulations of p(θ |α, β). Subse-
be binomial random variables whose probabilities quently, the joint posterior distribution of the hyper
of failure are θi , i ∈ {1, 2, 3, 4}, and π , respectively. parameters is obtained using Bayes’ theorem.
In this regard, the number of occurrences for both p(α, β) p(D| α, β)
the basic events and the top event follow a binomial p(α, β | D) =  (11)
p(α, β) p(D| α, β)∂α∂β
distribution:
  Similarly, the double integral in the denomina-
N t t
p(mi |N, θi ) =
t
θ mi (1 − θi ) N−mi , (6) tor is overloaded and its solution can be approxi-
mit i
mated by conducting MCMC simulations on p(α, β).
  Finally, the joint posterior distribution of θ , or the in-
N t t formative posterior is determined through marginal-
p(nt |N, π ) = π n (1 − π ) N−n , (7)
nt ization.

where mit is the number of occurrences of basic event p(θ | D) = p(θ |α, β) p(α, β | D)∂α∂β (12)
i during the tth interval. The distribution in Equa-
tion (6) is considered to be the base distribution of The individual parameter for each of the basic
the basic event i. To take into account the source-to- events can be obtained in an analogous manner, for
source variability in data samples, a noninformative instance, as shown in Equation (13).
prior is imposed on the parameter of interest, θi . It 
is noted that a noninformative prior is not assigned p(θ1 | D) = p(θ | D)∂θ2 ∂θ3 ∂θ4 (13)
to the top event as the source-to-source variability in
data of the top event originates from the uncertainty Finally, the estimated number of occurrences for
in the basic events, as a result of the fault tree struc- each basic events for the next interval T + 1 is given
ture. As θi is the parameter of a binomial distribu- as: 
tion, its prior is then chosen as a conjugate prior of p(mi |D; N) = p(mi |θi ; N) p(θi |D)∂θi ,
the binomial distribution, which is a β distribution. 
(αi + βi ) miT+1 = mi p(mi |D; N)dmi . (14)
p(θi |αi , βi ) = θi αi −1 (1 − θi )βi −1 (8)
(αi ) + (βi )
As demonstrated in the above procedure, it is
To construct a noninformative prior θi , the possible to conduct backward analysis on fault tree
hyper parameters αi and βi are sampled from using HBM; the parameters of the basic events can
the diffuse gamma distribution, αi , βi ∼ gamma be estimated with only data samples of the top event.
(0.0001, 0.0001). Let θ = { θ1 , θ2 , θ3 , θ4 }, α = { α1 , These parameters are also modeled in a joint dis-
α2 , α3 , α 4 }, and β = { β1 , β2 , β3 , β 4 }, the joint like- tribution that takes into account their interdepen-
lihood function for θ (as shown in Equation (9)) is dence as opposed to the assumption of complete in-
determined by substituting Equation (5) into Equa- dependence of the traditional fault tree. In addition,
tion (7). the use of a noninformative prior in HBM ensures
T  
the source-to-source variability in data samples is ac-
 N t counted for in the estimation process without bias.
p(D|θ) = (θ1 θ2 (θ3 +θ4 −θ3 θ4 )n
nt The estimated values better reflect the real situation.
t=1
t
As compared to many works using a Bayesian
× (1−θ1 θ2 (θ3 +θ4 −θ3 θ4 )) N−n (9) network approach to model fault trees,(3,5,24,25) the
1674 Yu, Khan, and Veitch

proposed approach does not require the construction


of CPTs or specifying prior probabilities of the ba-
sic events for conducting inferences. Therefore, it is
more flexible to be used for safety analysis of indus-
trial operations under data scarcity.

3.2. HBM of Event Tree


The event tree is a diverging model linking an ini-
tial event to its possible consequences. Each conse-
quence corresponds to failures of certain safety bar-
riers. The severity of each consequence is related to
the number of failed safety barriers associated with
it. The most severe consequence, which is a result
of complete failure of all safety barriers, is defined
Fig. 4. An event tree example.
as a major accident in this study, whereas the other
less severe consequences are the precursory events
of the major accident. The rationale behind this def-
barriers. For the same reason described in Section
inition is that all the consequences of the event tree
3.1, a noninformative prior is only needed for the
are related to the same cause through the same set
safety barriers. The procedure of obtaining the in-
of safety barriers. It is therefore legitimate to claim
formative posteriors is demonstrated using a simple
that there is a direct link between the consequences
event tree model shown in Fig. 4.
with lower level of severity and the most severe con-
Parameters of the four potential consequences
sequence. In addition, it is not rare that there are
and the two safety barriers are arranged in arrays,
more data available for consequences of low severity,
π = {π1 , π2 , π3 , π4 } and θ = {θ1 , θ2 }, respectively. It
allowing for more accurate estimation of their occur-
is assumed that the only available data for parame-
rence probabilities. The information gathered from
ter estimation are the number of occurrences of each
the low-severity consequences can be used to esti-
of the consequences in a specific time interval for T
mate the probability of occurrence of a major acci-
consecutive intervals D = {d1t , d2t , d3t , d4t }t=1
T
. For the
dent where there is little data available through this
event tree, the base distribution for the failures of
direct link.
each safety barrier is assumed to be a binomial distri-
Both forward and backward analysis are neces-
bution. Therefore, the priors for θ are selected to be
sary to enable the information exchange between the
beta distributions with hyper parameters α = {α1 , α2 }
consequences. However, the event tree shares the
and β = {β1 , β2 }.
same limitation with the fault tree, which allows only
There are two methods of estimating the in-
forward analysis in quantitative reasoning. Addition-
formative posterior failure probability distributions
ally, the forward analysis of the event tree also re-
of the safety barriers. The first method assumes
quires the prior probabilities of the initial event and
that the failures of safety barriers are completely
safety barriers to be specified in advance, which is
independent of each other. The informative pos-
not easily achieved under data scarcity. In the HBM
teriors of these safety barriers are then estimated
framework, estimation of the model parameters of
based on the number of successes and failures
the event tree is broken down into two parts. In the
for each time interval. The causal structure of the
first part, the probabilities of failure of safety barri-
event tree allows the decomposition of the num-
ers and the probabilities of occurrence of the conse-
ber of occurrences of the consequences into the
quences are estimated. In the second part, the results
number of successes and failures of each safety
from the first part can be further used to estimate the
barriers. For instance, the number of successes and
parameter of interest of the initial event.
failures of the SB1 and SB2 in Fig. 4, for a single
time interval t, can be obtained as shown in Table I.
3.2.1. Estimating Probabilities of Failure of
Subsequently, a HBM procedure can be ap-
Safety Barriers
plied independently to each safety barrier to deter-
The main objective of this part is to obtain an in- mine its informative posterior probability of failure.
formative posterior for the parameters of the safety The HBM procedure of SB1 is shown as following.
Risk Analysis of Major Accidents 1675

Table I. Number of Successes and Failures for SB1 and SB2 other and their occurrence probabilities sum up to
4
1, i=1 πi = 1. Under this setting, the joint likelihood
Number of Successes Number of Failures
function of these four parameters can be modeled as
SB1 d1t + d2t d3t + d4t a multinomial distribution function:
SB2 d1t + d3t d2t + d4t l(D|π1 , π2 , π3 , π4 )

T
kt ! d1t d2t d3t d4t
= t t t t π1 π2 π3 π4 , (17)
Because the number of failures of SB1 is assumed d1 !d2 !d3 !d4 !
t=1
to follow a binomial distribution, the likelihood func-
where kt is the total number of occurrences during
tion of SB1 is given as:
time interval t, kt = d1t + d2t + d3t + d4t . As a result, the

T
likelihood function of θ, l(D|θ) is obtained by substi-
p(D1 |θ1 ) = p ( f t = d3t +d4t |kt = d1t + d2t +d3t +d4t , θ1 ) tuting Equation (16) into Equation (17).
t=1
  
T

T
kt kt ! t
=
t
θ1 f (1 − θ2 )k − f
t t
(15) l(D|θ) = (1 − θ1 )(1 − θ2 )d1 (1 − θ1 )
ft dt !dt !dt !dt !
t=1 t=1 1 2 3 4
t t t
The conjugate prior for Equation (15) is a β × θ2 d2 θ1 (1 − θ2 )d3 θ1 θ2 d4 (18)
distribution, p(θ1 |α1 , β1 ). In this case, the hyper
parameters α1 and β1 are sampled from the dif-
To form the noninformative prior for θ ,
fuse gamma distribution. Then, Equations (1)–(3)
the hyper parameters of θ are sampled from
are used to compute the informative posterior dis-
the diffuse gamma distribution, αi , βi ∼ gamma
tribution of the failure probability of SB1. The exact
(0.0001, 0.0001), i ∈ {1, 2}. The noninformative prior
same procedure is repeated for SB2, C1, C2, C3, and
is then updated using this data matrix to obtain the
C4 to obtain their informative posterior distributions.
informative posterior. The procedure for obtaining
Although data uncertainty is taken into account
the informative posterior is the same as that for the
by means of using a HBM procedure independently
fault tree, which follows from Equations (11)–(12).
for each safety barrier, the interdependence be-
Finally, the individual posterior probability of occur-
tween SB1 and SB2 is completely neglected in this
rences of each consequence is estimated using for-
method. In reality, the failure of a safety barrier of-
ward analysis in Equation (19). Likewise, the data
ten has a considerable impact on the operation of
samples of θ for approximating the overloaded in-
other safety barriers. Neglecting their interdepen-
tegral are sampled using MCMC simulations from
dence might lead to inaccurate estimation of their
p(θ |D).
failure probabilities. 
To address the issue in the first method, θ1 and
p(πi |D) = p(πi |θ ) p(θ |D)∂θ, i ∈ {1, 2, 3, 4}
θ2 need to be modeled in a joint likelihood function
and updated simultaneously with data. The joint like- 
lihood function of θ1 and θ2 is constructed in the fol- π̂i = πi p(πi |D)dπi (19)
lowing steps. The occurrence probabilities of the con-
sequences depend on the failure probabilities of the
safety barriers according to the following relation- 3.2.2. Estimating the Probability of Occurrence
ships. of the Initial Event
π1 = (1 − θ1 )(1 − θ2 ); The structure of the event tree provides a quick
way of estimating the parameter of interest of the
π2 = (1 − θ1 )θ2 ;
initial event. Data samples for the number of occur-
π3 = θ1 (1 − θ2 ); rences of consequences can be translated into the ini-
tial event occurrence. According to the property of
π4 = θ1 θ2 . (16)
the event tree, for each time interval t, the number
of occurrences of the initial event is simply the sum
For the event tree, consequences originating of occurrences of all the consequences, kt . Because
from an initial event are mutually exclusive of each the time interval is fixed, the prior distribution for the
1676 Yu, Khan, and Veitch

number of occurrence of the initial event within each


time interval can be modeled using a Poisson distri-
bution with failure rate λ as the parameter of interest.

λk e−tλ
t

p(kt |λ) = (20)


kt !
In turn, the likelihood function for D = {kt }t=1
T
is
constructed as:

T
λk e−tλ
t

p(D|λ) = . (21)
kt !
t=1

In a similar setting to Section 3.1, a noninfor-


mative prior is imposed on the hyper parameters
of λ to account for the uncertainty in data. The Fig. 5. Event tree diagram for an offshore blowout.(26)
prior distribution of λ is chosen to be a conjugate
prior of the Poisson distribution, which is a gamma
distribution. ples is also considered in the modeling, leading to a
β μ μ−1 −νλ more realistic estimation.
p(λ|μ, ν) = λ e (22)
(α)
To construct a noninformative prior of λ, the 4. CASE STUDY—OFFSHORE BLOWOUT
hyper parameters μ and ν are sampled from Offshore blowout is one of most devastating ac-
the diffuse gamma distribution, μ, ν ∼ gamma cidents in marine and offshore operations. Blowouts
(0.0001, 0.0001). The noninformative prior is then are rare but can have significant consequences, such
updated using data to form an informative posterior fatalities, capital losses, and possibly irreversible
for λ. The informative posterior is obtained using damage to environment. An offshore blowout is the
Equations (1)–(3). The informative posterior can be most severe consequence of a kick during the drilling
used to predict the number of occurrences of the ini- operation. Detailed information on the mechanism
tial event in the next time interval, t = T + 1. of a kick can be found in the work of Khakzad

et al.(26) To prevent a kick from developing into a ma-
p(k | D) = p(k|λ) p(λ | D)∂λ jor blowout, a number of safety barriers are typically
 implemented during the drilling operation. These
kT+1 = kp(k | D)dk (23) safety barriers are presented in the form of an event
tree diagram in Fig. 5.
It is noted that in Fig. 5, the failure of either the
Also, the number of occurrences for each conse-
kick detection or blowout preventer (BOP) will lead
quences can be estimated:
to a major blowout. In this case, a blowout is con-
E diT+1 = E kT+1 × π̂i . (24) sidered a major accident and the consequences from
C1 to C3 are considered to be the precursory events.
The HBM of the event tree allows both forward In this study, data samples collected for parameter
and backward analysis. This enables the informa- estimations are the number of occurrences of each
tion exchange between a major accident and its pre- of the above four consequences during development
cursory events, which effectively addresses the data drilling in the Gulf of Mexico region from 1996 to
scarcity problem in estimating the probability of oc- 2012(27) and are presented in Table II. The estimated
currence of major accidents. Probabilities of failure values for the safety barriers can be used to identify
of the safety barriers can also be estimated from the the weak links in the safety system for further im-
number of occurrences of each consequence. This provement.
deductive reasoning, without the need of specifying According to the event tree structure, the num-
prior probabilities, is not possible to achieve using a ber of occurrences for the kick is the sum of the
traditional event tree or Bayesian network. Further- number of occurrences of all the consequences. Also,
more, the source-to-source variability in data sam- the blowout data in Table II contain the number of
Risk Analysis of Major Accidents 1677

Table II. Major Accident and Precursor Data of Offshore Table III. Comparison of Various Estimators in Estimating
Blowout in Gulf of Mexico.(27) Probability of Failure of Kick Detection

Time Estimated
Intervals Safe Mishap Leak Blowout Kick Estimator Formulae Probability Source

1996 0 0 1 3 4 One-third P= 1
3n 0.0043 Ref. 29
1997 2 1 1 1 5 estimator
1998 0 3 1 3 7 Minimax P= 1
2.5n 0.0051 Ref. 30
1999 1 2 0 2 5 estimator
2000 0 2 4 2 8 1
Median Bayes P = 1 − 0.5 n+1 0.0087 Ref. 29
2001 1 3 1 3 8 estimator
2002 0 2 1 1 4 1
2003 2 1 0 1 4 P2 estimator P = 1 − 0.5 n 0.0088 Ref. 29
2004 0 3 2 0 5 Bayes estimator P= 1
0.0125 Ref. 31
n+2
2005 0 3 0 1 4
2006 0 1 5 2 8 Upper-bound P= 1
n 0.0128 Ref. 29
2007 0 1 0 3 4 estimator
2008 1 1 0 3 5
2009 0 0 0 2 2
2010 0 0 0 1 1
Table IV. Expected Probabilities for the Failure of Safety
2011 0 0 0 2 2
Barriers and Occurrence of Consequences (Offshore Blowout)
2012 0 0 0 2 2
Sum 7 23 16 32
Probability
Total = 46 Total = 32 Grand total = 78
Probability (HBM
(HBM Joint Independent
Event Tree Likelihood Probability Likelihood
Parameters Function) (MLE) Functions)
occurrences of both C4 and C5 consequences. There- Kick detection 0.1817 0.0000 0.0018
fore, it is not possible to decompose the contribu- Kill operation 0.8808 0.9103 0.9176
tion of the failure of the BOP or kick detection to BOP 0.2926 0.4507 0.4639
the occurrence of blowout, making it difficult to es- Casing 0.3843 0.4103 0.5897
timate the failure probabilities of these two barriers C1: Safe 0.0927 0.0897 0.0947
C2: Mishap 0.2964 0.2950 0.2918
using traditional techniques such as a Bayesian net- C3: Leak 0.1848 0.2051 0.1911
work. Khakzad et al.(28) proposed a workaround of C4: Blowout 0.4260 0.4103 0.4191
this issue, which assumed the blowout was solely due
to the failure of the BOP failure. This assumption
rendered a zero failure situation for the kick detec-
tion upon demands. A number of estimators capable mation results of MLE are presented in column 3 of
of handling zero failure events were then applied to Table IV. It is observed that the probability of kick
estimate the probability of failure of the kick detec- detection failing is 0 due to the zero failure assump-
tion. The estimated failure probabilities of the kick tion, which is unrealistic. Moreover, these techniques
detection using these estimators are summarized in simply rely on the total number of demands for
Table III. the kick detection and fail to recognize that there
The value of n in Table III is 78, the sum of is source-to-source variability in data between each
values in the last column of Table II, representing time interval, due to the sporadic conditions under
the total number of demands received by the safety which the drilling operations were carried out.
barrier—kick detection. It is observed that due to The two methods introduced in Section 3.2.1
the radical assumption of zero failures of the kick are used to address the data uncertainty issue in
detection, the estimated values of all the techniques failure probability estimation. In the first method,
are very small and also differ significantly from each the failure of safety barriers and the occurrences of
other; therefore, they might not reflect the real sit- the consequences are considered to be completely
uation. To make this comparison more comprehen- independent. A binomial distribution is assigned to
sive, traditional MLE is also applied to estimate the each safety barrier to model its number of failures
failure probabilities of the safety and the probabil- per time interval. Similarly, a binomial distribution
ities of occurrences of the consequences. The esti- is also given to each consequence for the same
1678 Yu, Khan, and Veitch

Fig. 6. Estimated distributions of the


safety barriers.

Fig. 7. Estimated distributions of the con-


sequences.

modeling purpose. Because these events are inde- is one of the values of a random variable following
pendent of each other, it is not possible to discern an unknown distribution. The noninformative prior
the contribution of failure of kick detection from in the HBM enables an adequate exploration of
that of BOP to the occurrences of blowouts. In this the entire sample space of this unknown distribu-
regard, it is also assumed that blowouts are solely tion, resulting in a more realistic estimation of the
due to failure of BOP. As a result, the same zero failure probability of kick detection. Despite this
failure issue is also presented to the binomial HBM advantage, the interdependence among the safety
model of kick detection. The HBM procedure is barriers is still neglected in modeling. The estimated
implemented on the OpenBUGS platform.(32) The failure probability of the kick detection is still
estimated failure probability for kick detection based unreasonably small considering there is a direct
on the binomial HBM model is shown in column 4 of relationship between failure of kick detection and
Table IV. This result demonstrates that a slight blowouts, which make up to 32 (41%) occurrences
improvement in flexibility in dealing with zero data of the undesired consequences.
events is achieved by the binomial HBM model as However, the second method can effectively
compared to MLE. This is mainly due to the fact that avoid the problems of MLE and the binomial HBM
HBM is able to take into account the uncertainty by fully exploring the interdependence between the
in data. More specifically, the zero occurrence of consequences and taking into account the uncer-
an event under the HBM setting is not absolute; it tainty in data samples. Following the procedure
Risk Analysis of Major Accidents 1679

After obtaining the expected probability of fail-


ure of the safety barriers, the probabilities of oc-
currence of the consequences are estimated us-
ing forward analysis. Likewise, the estimated pos-
terior probability distributions of the consequences
are shown in Fig. 7. The expected values of these
probability distributions, as summarized in Table
IV, are the predicted probabilities of occurrence of
the consequences in the next time interval (2013)
and are estimated using Equation (19). It is ob-
Fig. 8. Estimated distribution for the occurrence rate of the kick.
served that the probabilities of occurrence of the
consequences C2 to C4 are much higher than the
presented in Section 3.2, the relationship between probability of safe operation. This is primarily due
the consequences and the safety barriers are firstex- to the higher failure probability of the kill op-
tracted from the event tree diagram: eration. This piece of information could help the
safety engineers identify the weak link in the safety
π1 = (1 − θ1 )(1 − θ2 ); system.
π2 = (1 − θ1 )θ2 (1 − θ3 )(1 − θ4 ); The number of kicks from 1996 to 2012 can be
used to predict the number of kicks in 2013. As out-
π3 = (1 − θ1 )θ2 (1 − θ3 )θ4 ; lined in Section 3.2.2, the occurrence of the initial
π4 = θ1 + (1 − θ1 )θ2 θ3 , (25) event of an event tree during each time interval is
considered to follow a Poisson distribution.
where π = {π1 , π2 , π3 , π4 } and θ = {θ1 , θ2 , θ3 , θ4 } are In this respect, using Equations (20)–(24), the
the probabilities of occurrence of the consequences number of occurrences of kick is estimated to be
and the probabilities of failure of the safety barriers, around 5 (expected value = 4.582), as shown in Fig. 8
respectively. It is noticed that the probability of oc- and the number of occurrences of each consequence
currence of blowout is calculated by adding the prob- is 0, 2, 1, 2, respectively.
abilities of both C4 and C5. This allows the in- There are many causes that could lead to a kick
terdependence between the BOP and kick detec- in a drilling operation. Fig. 9 shows the fault tree rep-
tion to be modeled in the joint likelihood function, resenting a simple causal model of the kick. This ex-
which is obtained by substituting Equation (25) into ample is used to demonstrate the capability of the
Equation (17). In this way, the zero event situation proposed technique to address the weaknesses of
for the kick detection is avoided. Subsequently, the fault tree analysis.
informative posterior for the failure probabilities of In fact, this model in Fig. 9 is the same as the
the safety barriers are computed using Equations illustrated example presented in Section 3.1. In
(11), (12), and (19). a similar setting to the illustrative example, the
The estimated informative posterior density number of occurrences for both the basic events
functions of the failure probabilities are presented and the top event is considered to follow a binomial
in Fig. 6 and their expected values are presented in distribution. The only data samples available for
Table IV. As compared to the values in Table III, estimating the probabilities of the basic events are
the expected probability of kick detection acquired the number of kicks listed in the last column of Table
using the second method is in the same order of II. It is noted that the data samples do not include
magnitude of the other safety barriers. This proba- the number of trials/operations (N) for the binomial
bility estimation is reasonable as the total number distribution. In this example, N is estimated to be
of consequences as a result of successful kick detec- 72 according to the number of new well drilling
tion (C1, C2, and C3) is bigger than the total num- permits granted from 2011 to 2014 in the Gulf of
ber of blowouts, not to mention that a portion of the Mexico region.(34) Following the procedure outlined
blowouts (C4) also belongs to the consequences of in Section 3.1, a noninformative prior is constructed
successful kick detection. On the other hand, the kill for the parameters of each basic event and is up-
operation has the highest probability of failure. This dated using the kick data to become the informative
leads to a significantly higher number of C2: mishaps posterior. The informative posterior distributions of
and C3: leaks compared to C1: safe. the probabilities of occurrence of the basic events
1680 Yu, Khan, and Veitch

Fig. 9. Simple fault tree for kick.(33)

Fig. 10. Estimated distributions of the oc-


currence probabilities of basic events (off-
shore blowout).

are shown in Fig. 10 and the expected probabilities Table V. Expected Probabilities of Occurrence of the Basic
for these events are summarized in Table V. Events and Top Event
Upon estimating occurrence probabilities of the Fault tree Parameters Estimated Probabilities
basic events, the occurrence probability of the top
event can be determined using forward analysis. The Power supply failure 0.7873
posterior probability distribution of the top event Technical failure 0.6629
kick is shown in Fig. 11. The expected value of this Insufficient amount of mud 0.0844
Insufficient circulation of seawater 0.1111
distribution is listed in the last row of Table V. This Kick 0.0645
value is the predicted probability of occurrence of a
kick in time interval 2013. The expected number of
occurrences of a kick in 2013 is then computed as
0.0642 × N = 5.0076 ≈ 5, which is the same as the same basis. As a result, the expected number of oc-
number estimated in the event tree example. This currence for 2013 matches with that obtained from
could be explained by considering probability of suc- the Poisson distribution.
cess as a weighting factor in calculating the expected It is demonstrated in this case study that the
value of the binomial distribution. Because N is the proposed techniques are able to address the weak-
same for the number of occurrences of kick across nesses of both event tree and fault tree analysis.
all time intervals, the probability/weighting factor in For the event tree example, by exploring the inter-
each time interval has the same basis. The predicted dependence between the BOP and kick detection,
probability in the next time interval also shares the the zero data event encountered in the traditional
Risk Analysis of Major Accidents 1681

shown that the predictions made by the proposed


technique agree well with the pattern in data.
The performance of the proposed HBM tech-
nique relies on precise understanding of logical re-
lationships of cause and effects. These relationships
could be represented in any form, such as event or
fault trees. Without the availability of these relation-
ships, it is not possible to establish a joint likelihood
function of the model parameters, such as probabil-
ities of failure of safety barriers and occurrences of
Fig. 11. Posterior distribution of the probability of occurrence of causes. The development of a complete model inde-
kick.
pendent safety analysis technique inheriting all fea-
tures of the presented technique is the focus of the
probability estimation is avoided. The source- next work.
to-source variability in data is also effectively
incorporated in the estimation process by means of
ACKNOWLEDGMENTS
HBM for a more accurate prediction of occurrence
probability of a major accident in the next time We acknowledge the financial support of the
interval. The proposed technique is also adapted Lloyd’s Register Foundation. Lloyd’s Register Foun-
to modeling a simple fault tree. This enables the dation is a charitable foundation helping to protect
prediction of the probability of occurrence of the life and property by supporting engineering-related
basic events using only data of the top event, which education, public engagement, and the application of
is not possible to achieve with traditional inference research.
techniques, such as a Bayesian network.
REFERENCES
5. CONCLUSIONS 1. Bucci P, Kirschenbaum J, Mangan LA et al. Construction of
event-tree/fault-tree models from a Markov approach to dy-
This article presents a novel HBM-based tech- namic system reliability. Reliability Engineering & System
nique for risk analysis of major accidents. The pro- Safety, 2008; 93(11):1616–1627.
2. Assaf T, Dugan JB. Diagnostic expert systems from dy-
posed technique provides a flexible and universal namic fault trees. Pp. 444–450 in Proceedings of the Annual
framework to extend the capability of traditional Symposium-RAMS on Reliability and Maintainability, IEEE,
fault tree and event tree analysis techniques. The 2004, Los Angeles, CA, USA .
3. Khakzad N, Khan F, Amyotte P. Safety analysis in process
static structure of the model developed using these facilities: Comparison of fault tree and Bayesian network
techniques allows only forward analysis in quantita- approaches. Reliability Engineering & System Safety, 2011;
tive reasoning. The proposed technique models all 96(8):925–932.
4. Ching J, Leu S-S. Bayesian updating of reliability of civil in-
the model parameters into a joint likelihood func- frastructure facilities based on condition-state data and fault-
tion such that information exchange between these tree model. Reliability Engineering & System Safety, 2009;
parameters is allowed in all directions, enabling both 94(12):1962–1974.
5. Khakzad N, Khan F, Amyotte P. Dynamic safety analysis of
forward and backward analysis. Another major ad- process systems by mapping bow-tie into Bayesian network.
vantage of using a joint likelihood function is the Process Safety and Environmental Protection, 2013; 91(1):46–
modeling of interdependence between model param- 53.
6. Bier V, Yi W. The performance of precursor-based estimators
eters, which leads to a more realistic estimation of for rare event frequencies. Reliability Engineering & System
probability of occurrence of major accidents. The Safety, 1995; 50(3):241–251.
third major advantage of the proposed technique 7. Quigley J, Bedford T, Walls L. Estimating rate of occurrence
of rare events with empirical Bayes: A railway application. Re-
lies in how it is able to cope with data uncertainty, liability Engineering & System Safety, 2007; 92 (5):619–627.
which is not possible to achieve in the original fault 8. Ibragimov IdA, Has’ minskii RZ. Statistical Estimation:
tree and event tree analysis. The HBM approach is Asymptotic Theory. New York: Springer Science & Business
Media, 2013.
integrated with the joint likelihood function to ac- 9. Bier VM, Haimes YY, Lambert JH et al. A survey of ap-
count for source-to-source variability in data to min- proaches for assessing and managing the risk of extremes. Risk
imize uncertainty in parameter estimation. To verify analysis, 1999; 19(1):83–94.
10. Goossens L, Cooke R. Applications of some risk assessment
the effectiveness the proposed technique, an offshore techniques: Formal expert judgement and accident sequence
blowout case study has been used. The results have precursors. Safety Science, 1997; 26(1):35–47.
1682 Yu, Khan, and Veitch

11. Meel A, Seider WD. Plant-specific dynamic failure assessment 23. Gelman A. Prior distributions for variance parameters in hier-
using Bayesian theory. Chemical Engineering Science, 2006; archical models (comment on article by Browne and Draper).
61(21):7036–7056. Bayesian Analysis, 2006; 1(3):515–534.
12. Kalantarnia M, Khan F, Hawboldt K. Dynamic risk assess- 24. Abimbola M, Khan F, Khakzad N et al. Safety and risk analy-
ment using failure assessment and Bayesian theory. Journal sis of managed pressure drilling operation using Bayesian net-
of Loss Prevention in the Process Industries, 2009; 22(5):600– work. Safety Science, 2015; 76:133–144.
606. 25. Bobbio A, Portinale L, Minichino M et al. Improving the
13. Bearfield G, Marsh W. Generalising event trees using analysis of dependable systems by mapping fault trees into
Bayesian networks with a case study of train derailment. Pp. Bayesian networks. Reliability Engineering & System Safety,
52–66 in Computer Safety, Reliability, and Security. Springer, 2001; 71(3):249–260.
2005. 26. Khakzad N, Khan F, Amyotte P. Quantitative risk analysis of
14. Siu NO, Kelly DL. Bayesian parameter estimation in prob- offshore drilling operations: A Bayesian approach. Safety Sci-
abilistic risk assessment. Reliability Engineering & System ence, 2013; 57:108–117.
Safety, 1998; 62(1):89–116. 27. BSEE (Bureau of Safety and Environmental Enforce-
15. Chen Z, McGee M. A Bayesian approach to zero-numerator ment US). Incident statistics and summaries 1996–2012.
In Series Incident Statistics and Summaries 1996–2012,
problems using hierarchical models. Journal of Data Science,
Available at: https://www.bsee.gov/stats-facts/offshore-
2008; 6(2):261–268.
incident-statistics/incident-stats-and-summaries.
16. Yang M, Khan FI, Lye L. Precursor-based hierarchical 28. Khakzad N, Khan F, Paltrinieri N. On the application of near
Bayesian approach for rare event frequency estimation: A accident data to risk analysis of major accidents. Reliability
case of oil spill accidents. Process Safety and Environmental Engineering & System Safety, 2014; 126:116–125.
Protection, 2013; 91(5):333–342. 29. Bailey RT. Estimation from zero-failure data. Risk Analysis,
17. Kaplan S. On a “two-stage” Bayesian procedure for determin- 1997; 17(3):375–380.
ing failure rates from experimental data. IEEE Power Engi- 30. Quigley J, Revie M. Estimating the probability of rare events:
neering Review, 1983; 1(PER-3):43. Addressing zero failure data. Risk Analysis, 2011; 31(7):1120–
18. Kaplan S. On a two-stage Bayesian procedure for determining 1132.
failure rates from experiential data. In Nuclear Power Plant 31. Thorne M, Williams M. A method for estimating failure rates
Risk Management, 1985. for low probability events arising in American Nuclear Soci-
19. Datta GS, Ghosh M. On the invariance of noninformative pri- ety, Inc., La Grange Park, IL, USA.
ors. The annals of Statistics, 1996; 24(1):141–159. 32. Lunn D, Spiegelhalter D, Thomas A et al. The bugs
20. Assoudou S, Essebbar B. A Bayesian model for Markov project: Evolution, critique and future directions. Statistics in
Chains via Jeffrey’s prior. Communications in Statistics— Medicine, 2009; 28(25):3049–3067.
Theory and Methods, 2003; 32(11):2163–2184. 33. Podofillini L, Sudret B, Stojadinovic B et al. Safety and Reli-
21. Kelly DL, Smith CL. Bayesian inference in probabilistic risk ability of Complex Engineered Systems. London: Taylor and
assessment—The current state of the art. Reliability Engineer- France Group, 2015.
ing & System Safety, 2009; 94(2):628–643. 34. BSEE (Bureau of Safety and Environmental Enforcement
22. Yan Z, Haimes YY. Cross-classified hierarchical Bayesian US). Status of Gulf of Mexico well permits 2011–2014.
models for risk-based analysis of complex systems under In Series Status of Gulf of Mexico Well Permits 2011–
sparse data. Reliability Engineering & System Safety, 2010; 2014, Available at: https://www.bsee.gov/stats-facts/ocs-
95(7):764–776. regions/status-of-gulf-of-mexico-well-permits.

You might also like