NTNU
Bayesian Networks in Reliability: A primer
Helge Langseth
helgel@math.ntnu.no
Department of Mathematical Sciences, Norwegian University of Science and Technology, Trondheim, Norway
MMR 2004 – p.1/13
Bayesian Networks in Reliability: A primer Helge Langseth - - PowerPoint PPT Presentation
NTNU Bayesian Networks in Reliability: A primer Helge Langseth helgel@math.ntnu.no Department of Mathematical Sciences, Norwegian University of Science and Technology, Trondheim, Norway MMR 2004 p.1/13 Outline NTNU Basics of Bayesian
Helge Langseth
helgel@math.ntnu.no
Department of Mathematical Sciences, Norwegian University of Science and Technology, Trondheim, Norway
MMR 2004 – p.1/13
MMR 2004 – p.2/13
P(B, F, H, G, E, C) H: Head-lights G: Fuel gauge C: Car starts F: Fuel level E: Engine turns B: Battery
MMR 2004 – p.3/13
P(B, F, H, G, E, C) H: Head-lights G: Fuel gauge C: Car starts F: Fuel level E: Engine turns B: Battery B: Battery pa(E) = {B} E: Engine turns
MMR 2004 – p.3/13
P(B, F, H, G, E, C) H: Head-lights G: Fuel gauge C: Car starts F: Fuel level E: Engine turns B: Battery B: Battery pa(E) = {B} E: Engine turns H: Head-lights G: Fuel gauge F: Fuel level B: Battery nd(E) = {H, G, F, B}
MMR 2004 – p.3/13
P(B, F, H, G, E, C) H: Head-lights G: Fuel gauge C: Car starts F: Fuel level E: Engine turns B: Battery B: Battery pa(E) = {B} E: Engine turns H: Head-lights G: Fuel gauge F: Fuel level B: Battery nd(E) = {H, G, F, B} B: Battery X⊥ ⊥nd(X) \ pa(X) | pa(X) E⊥ ⊥{H, G, F} | B Other d-sep. rules: Pearl(88)
MMR 2004 – p.3/13
P(B, F, H, G, E, C) H: Head-lights G: Fuel gauge C: Car starts F: Fuel level E: Engine turns B: Battery B: Battery pa(E) = {B} E: Engine turns H: Head-lights G: Fuel gauge F: Fuel level B: Battery nd(E) = {H, G, F, B} B: Battery X⊥ ⊥nd(X) \ pa(X) | pa(X) E⊥ ⊥{H, G, F} | B Other d-sep. rules: Pearl(88) E: Engine turns H: Head-lights G: Fuel gauge C: Car starts F: Fuel level E: Engine turns B: Battery E B =empty B =empty yes .01 .97 no .99 .03 E: Engine turns P(E | pa (E)) = P(B)P(F)P(H | B)P(G | F) · P(E | B)P(C | E, F)
MMR 2004 – p.3/13
Y M Mixture models M latent, multinomial p(y | M = m)
MMR 2004 – p.4/13
X latent, N(0, I) X1 X2 Linear regression Y1 Y2 Y3 Factor analyzers Y | x ∼ N(µ + Lx, Ψ), Ψ diagonal
MMR 2004 – p.4/13
X latent, N(0, I) X1 X2 Linear regression Y1 Y2 Y3 Factor analyzers M M latent, multinomial given M = m Mixture of Y | {x, M = m} ∼ N(µm + Lmx, Ψm), Ψm diagonal
MMR 2004 – p.4/13
X1 X2 X3 X4 X5
MMR 2004 – p.5/13
X1 X2 X3 X4 X5 X1 X2 X3 X4 X5
MMR 2004 – p.5/13
X1 X2 X3 X4 X5 X1 X2 X3 X4 X5 X1 X2 X3 X4 X5
MMR 2004 – p.5/13
X1 X2 X3 X4 X5 X1 X2 X3 X4 X5 X1 X2 X3 X4 X5 X1 X2 X3 X4 X5
MMR 2004 – p.5/13
X1 X2 X3 X4 X5 X1 X2 X3 X4 X5 X1 X2 X3 X4 X5 X1 X2 X3 X4 X5 X3,X4,X5 X1,X3,X4 X1,X2,X4 X3, X4 X1,X4
φ1(x3, x4, x5) ψ1(x3, x4) φ2(x1, x3, x4) ψ2(x1, x4) φ3(x1, x2, x4)
MMR 2004 – p.5/13
Y Z1 . . . Zm
MMR 2004 – p.6/13
Y Z1 . . . Zm
p(y | z1, . . . , zm) zi = 0 p1 zi = 1 zj = 1 zj = 0 p2 . . .
MMR 2004 – p.6/13
MMR 2004 – p.7/13
MMR 2004 – p.7/13
i=1 are
i=1 and correlations (e.g., in
k(xi, xj) ← pk−1(xi, xj) ·
p(xi)
k(xi, xj) ·
k(xi,xj)
p(xj)
MMR 2004 – p.8/13
i=1 are
i=1 and correlations (e.g., in
MMR 2004 – p.8/13
Can we estimate causal strength? Effect Cause
MMR 2004 – p.9/13
Can we estimate causal strength? Management TTF Planned PM NO! Destroyed by confounder
MMR 2004 – p.9/13
Can we estimate causal strength? Management TTF Planned PM Actual PM Yes! Intermediate (observable) effect saves the day!
MMR 2004 – p.9/13
MMR 2004 – p.10/13
MMR 2004 – p.11/13
Safety-critical software is special: No-fault-criterion: Bugs immediately removed Test in a traditional way is not sufficient (PIE algorithm; 50% of tested locations hide their faults). Safety-assessment requires: Disparate sources of information; several types
nature. The relation between evidence and safety assessment is not always direct or quantifiable We need a framework to combine these disparate sources of information in a transparent way
Qsystem Complexity Testing Experience Fault tol. Reliability Consequences System safety
MMR 2004 – p.12/13
Safety-critical software is special: No-fault-criterion: Bugs immediately removed Test in a traditional way is not sufficient (PIE algorithm; 50% of tested locations hide their faults). Safety-assessment requires: Disparate sources of information; several types
nature. The relation between evidence and safety assessment is not always direct or quantifiable We need a framework to combine these disparate sources of information in a transparent way Each node in the top-level model is refined using a “sub-net” The safety standard for safety critical software in aviation (RTCA/DO-17B) was implemented in this way See Gran (2002) for details
MMR 2004 – p.12/13
Bobbio, A., L. Portinale, M. Minichino, and E. Ciancamerla (2001). Improving the analysis
Engineering and System Safety 71(3), 249–260. Gran, B. A. (2002). The use of Bayesian Belief Networks for combining disparate sources of information in the safety assessment of software based systems. Ph. D. thesis, Department of Mathematical Sciences, Norwegian University of Science and
Jensen, F. V. (2001). Bayesian Networks and Decision Graphs. New York: Springer-Verlag. Langseth, H. and F. V. Jensen (2003). Decision theoretic troubleshooting in coherent systems. Reliability Engineering and System Safety 80(1), 49–61. Lauritzen, S. L. (1995). The EM-algorithm for graphical association models with missing
Moral, S., R. Rumí, and A. Salmerón (2001). Mixtures of truncated exponentials in hybrid Bayesian networks. In Sixth European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty, Volume 2143 of Lecture Notes in Artificial Intelligence, pp. 145–167. Springer-Verlag. Pearl, J. (1988). Probabilistic Reasoning in Intelligent Systems: Networks of Plausible
Pearl, J. (2000). Causality – Models, Reasoning, and Inference. Cambridge, UK: Cambridge University Press.
MMR 2004 – p.13/13