1 Department of Computer Science and Engineering, University of South Carolina 2005-05-16 Bayesian...

41
1 Department of Computer Science and Engineering, University of South Carolina 2005-05-16 Bayesian Network Development Bayesian Network Development Kevin B. Korb and Ann E. Nicholson Bayesian Artificial Intelligence, Chapman and Hall, 2004, esp. part III Kathryn B. Laskey and Suzanne M. Mahoney “Knowledge Engineering for Agile Belief Network Models,” IEEE Transactions on Data and Knowledge Engineering, 12, 4 (July/August 2000), 487-498 Paul Sticha, Dennis Buede, and Richard L. Rees “APOLLO: An Analytical Tool for Predicting a Subject’s Decision Making,” Proceedings of IA-05 (https://analysis.mitre.org/proceedings/ Final_Papers_Files/143_Camera_Ready_Paper.pdf)
  • date post

    20-Dec-2015
  • Category

    Documents

  • view

    215
  • download

    0

Transcript of 1 Department of Computer Science and Engineering, University of South Carolina 2005-05-16 Bayesian...

1 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Bayesian Network Bayesian Network DevelopmentDevelopment

Kevin B. Korb and Ann E. NicholsonBayesian Artificial Intelligence, Chapman and Hall, 2004,

esp. part III Kathryn B. Laskey and Suzanne M. Mahoney

“Knowledge Engineering for Agile Belief Network Models,” IEEE Transactions on Data and Knowledge Engineering, 12, 4 (July/August 2000), 487-498

Paul Sticha, Dennis Buede, and Richard L. Rees“APOLLO: An Analytical Tool for Predicting a Subject’s

Decision Making,” Proceedings of IA-05(https://analysis.mitre.org/proceedings/Final_Papers_Files/143_Camera_Ready_Paper.pdf)

2 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

APOLLOAPOLLO

Models built to date (May 2005): InvasionNational strikeDomestic threatMissile testingSupport for the Global War on TerrorismDispute over contested territoryPeace/cease-fire negotiationsUse of WMDMonetary devaluationEstablishment of a new caliphateOperational planning in a terror cell

3 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Use of the ModelsUse of the Models The analysts want to model the decisions of

foreign leaders Software alerts the analyst when certain

thresholds are met within the model, indicating that evidence suggests a change in what is to be believed

Models are continuously updated Models provide an auditable record of the

assumptions and of the supporting evidence Neutralize various analytic biases such as

Recency, halo, proximity, hindsight, personalization Neutralize various social biases such as

Senior expert, “party line,” published record, “biggest fistful of cables,” personality

4 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

ProcessProcess Two-day facilitated meetings per model Participants:

Analysts, subject-matter experts, facilitator, and model developer

Analysts provide information about the questions to be addressed by the model

Both analysts and external experts provide the information and assessments

Facilitator keeps the group framing the questions properly, e.g. in terms of conditional probability assessments, and keeps a healthy debate going

Model developer also acts as notetaker Model is projected on screen as it is developed

5 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

StepsSteps

Defining the question, e.g.: what will a national leader do in case of a national strike

Leave country, make concessions, hold a referendum, let a regional organization arbitrate, wait out, repress violently

Identify situational variables that may affect the leader’s decision, e.g.:

What are the leader’s objectives Add situational variables “subject to the time

constraints for the model development process

“One-and-a-half day of the two-day session are typically completed by this point.”

A personality module is added to each model, linked through “intervening variables.”

What-if analyses Sensitivity

6 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

General StrikeGeneral Strike

Figures are from Sticha et al.’s paper

7 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Conditional Probability Conditional Probability AssessmentAssessment

Table is from Sticha et al.’s paper

8 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Monitoring the Situation over Monitoring the Situation over TimeTime

Figure is from Sticha et al.’s paper

9 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Linkage Variables for Personality Linkage Variables for Personality ModelModel

Table is from Sticha et al.’s paper

10 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

A Complete ModelA Complete Model

Figure is from Sticha et al.’s paper

11 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Laskey and MahoneyLaskey and Mahoney

Probability elicitation worksheets (figure 6 in paper)

Exploit partitions in the state space of parent variables

Compare distributions Focus on order-of-magnitude differences

in small probabilities

12 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Korb and NicholsonKorb and Nicholson

Types of variablesTarget or queryEvidence or observationContext:

Sensing conditions, setting factors, background causal conditions

Controllable May be set, rather than observed

ValuesHow to discretize

13 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Graphical StructureGraphical Structure

Causal RelationshipsCause, effect, prevention, interference,

moderation, invalidation, enabling, explanation

Dependence and Independence RelationshipsD-separationRelevanceAssociation relationshipTemporal relationship

14 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Parameters (Probabilities)Parameters (Probabilities)

Sources:DataDomain expertsThe literature

ElicitationVerbal mapsOddsPie charts, histogramsLotteriesLocal structure

causal interaction or lack thereof: addition, prevention, XOR, synergy

Partitioning Divorcing

Preference structures (not in Korb and Nicholson)

15 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

NodesNodes

Nodes in a Bayesian network are in one-to-one correspondence with (random) variables.Variables map states (also known as values) to

subsets of the event spaceThe probability of a variable having a certain

value is the probability of all the events consistent with that variable having that value

Variables represent propositions about which the system reasons; they are therefore sometimes called propositional variables, even though they may take values other than true and false.

16 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

AttributesAttributes

Each variable has a set of identifying attributes

Attributes “play the role of variables in a logic programming language” [Laskey and Mahoney, UAI-97]

Attributes identify a particular instance of a random variable

Attributes are used to combine fragments:Fragments can be combined only if their attributes

unify

17 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Fragments As TemplatesFragments As Templates

Fragments are template models:“A template model is appropriate for problem domains

in which the relevant variables, their state spaces, and their probabilistic relationships do not vary from problem instance to problem instance” [L&M, UAI-97]

A scenario is a combination of instantiated template models

The attributes are used to identify and combine fragment instances but the probabilistic relationships do not change from instance to instance:The probability distribution described in the Bayesian

network is a joint distribution on the nodes only, not on the nodes and the attributes

18 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Medical IllustrationMedical Illustration

[A] medical diagnosis template network would contain variables representing background information about a patient, possible medical conditions the patient might be experiencing, and clinical findings that might be observed.

The network encodes probabilistic relationships among these variables. To perform diagnosis on a particular patient, background information and findings for the patient are entered as evidence and the posterior probabilities of the possible medical conditions are reported.

Although values of the evidence variables vary from patient to patient, the relevant variables and their probabilistic relationships are assumed to be the same for all patients. It is this assumption that justifies the use of template models.Direct quote from [Laskey and Mahoney, UAI-97]

19 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Guidance for Selection of Guidance for Selection of Nodes and AttributesNodes and Attributes

Nodes represent the variables on which the assessment of a situation depends. For example:State and hypothesis variablesObservation and test variables Intermediate and theoretical variablesSetting factors

Attributes identify a particular situation. E.g.:LocationTimeNameCase ID

20 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

MEBNs As a System Integrating MEBNs As a System Integrating First-Order Logic and First-Order Logic and

ProbabilityProbability Paulo C.G. da Costa and Kathryn B.

Laskey. “Multi-Entity Bayesian Networks without Multi-Tears.” Available at http://ite.gmu.edu/~klaskey/publications.html [Costa, 2005]

Kathryn B. Laskey. “First-order Bayesian Logic.” Available at http://ite.gmu.edu/~klaskey/publications.html [Laskey, 2005]

21 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Sample BN FragmentsSample BN Fragments

[Laskey, 2005]

22 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Using MEBNsUsing MEBNs

• Bayesian Network Fragment (BNF)It is the basic unit. Each network fragment consists of a set of related variables together with knowledge about the probabilistic relationships among the variables.

• Multi Entity Bayesian Network (MEBN)Collection of BNFs specifying probability distribution over attributes of and relationships among a collection of interrelated entities

• Situation-Specific Network(SSN) Ordinary finite Bayesian Network

constructed from an MEBN knowledge base, to reason about specific target hypothesis, with a particular evidence.

[Laskey, 2005]

23 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Formal SpecificationsFormal Specifications

First-Order Bayesian Logic A logical foundation that fully integrates

classical first-order logic with probability theory

Because first-order Bayesian logic contains classical first-order logic as a deterministic subset, it is a natural candidate as a universal representation for integrating domain ontologies expressed in languages based on classical first-order logic or subsets thereof.

[Laskey, 2005]

24 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Logic in BN FragmentsLogic in BN Fragments

[Laskey, 2005]

25 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

A Simple Bayesian NetworkA Simple Bayesian Network

[Laskey, 2005]

26 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

A Conditional Proabability A Conditional Proabability TableTable

[Laskey, 2005]

27 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Multiple InstancesMultiple Instances

[Laskey, 2005]

28 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Temporal RepetitionTemporal Repetition

[Laskey, 2005]

29 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

A Fragment (MFrag)A Fragment (MFrag)

[Laskey, 2005]

30 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

An Instance of an MFragAn Instance of an MFrag

[Laskey, 2005]

31 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

A Temporal MFragA Temporal MFrag

[Laskey, 2005]

32 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Temporal Situation-Specific BNTemporal Situation-Specific BN

[Laskey, 2005]

33 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Other Issues in [Laskey, 2005]Other Issues in [Laskey, 2005] Generative Theories Composition Algorithm Related Research:

HMMsDBNsPlatesObject-Oriented BNsProbabilistic Relational Models

Learning Decision Making

Multiple-entity decision graphs (MEDGs) are to influence diagrams what MEBNs are to Bayesian networks

OWL-PA planned MEBN-based extension to OWL

34 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Korb and NicholsonKorb and Nicholson

Types of variablesTarget or queryEvidence or observationContext:

Sensing conditions, setting factors, background causal conditions

Controllable May be set, rather than observed

ValuesHow to discretize

35 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Graphical StructureGraphical Structure

Causal RelationshipsCause, effect, prevention, interference,

moderation, invalidation, enabling, explanation

Dependence and Independence RelationshipsD-separationRelevanceAssociation relationshipTemporal relationship

36 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Parameters (Probabilities)Parameters (Probabilities)

Sources:DataDomain expertsThe literature

ElicitationVerbal mapsOddsPie charts, histogramsLotteriesLocal structure

causal interaction or lack thereof: addition, prevention, XOR, synergy

Partitioning Divorcing

Preference structures (not in Korb and Nicholson)

37 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Modeling Exercise: Natural Modeling Exercise: Natural DisasterDisaster

What will be the economic effect on a country due to a natural disaster disrupting the availability of a commodity?Answers: Uprising, War to acquire by force, Recession,

None Situational variables:

Extent of disaster Importance of commodityAlternate commodityAlternate supply

Evidence or observation variables:Projected need for commodity Import amountExport amount

38 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Basic Scenario for Basic Scenario for Terrorism NetworkTerrorism Network

Leader – communicates goals and ideology to planners and operatives

Planners – arrange funds; choose target; specify logistics

Logistics – types are weapons, transportation resources

Funds – support operatives; pay for logistics

Operatives – acquire logistics; use Intel; use logistics; perform terrorist act

Intel – identify logistics; identify target; support planners

Targets – types are facilities, resources, people, relationships

Terrorist act – requires operatives; requires logistics

(Not all relationships are shown)

Operatives Planners

Motivated Leader

Logistics

Intel

FundingTerrorAttack

39 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Basic Scenario for Basic Scenario for Economic Economic

InterdependencyInterdependency Catastrophic Event – either a

natural disaster, such as an earthquake, or a terrorist action, such as an oil pipeline disrupted

Supply Chains – the key resources and industries, from raw materials to finished goods

Industries – types Countries – locations of

resources and factories Consequences –the possibilities

for political or military actions, and the ramifications

CatastrophicEvent

What supply chainsare affected?

What industriesare affected?

What countriesare involved?

Are there alternativesuppliers/capabilities?

40 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Economic Disruption ScenarioEconomic Disruption Scenario1. An analyst receives the following message:

Intelligence Report 11/11/04: A conversation recorded by a wiretap on a suspected terrorist cell in Beirut had a discussion about crippling the Iranian economy by destroying oil production facilities.

2. The original intelligence message is passed to the Bayesian reasoning system for further analysis.

3. The message is parsed, marked-up semantically, and matched with prior analytical knowledge in the form of Bayesian network fragments.

4. The fragments are assembled into a number of plausible scenarios that explain the input information. The most plausible and complete scenario is shown to the analyst.

5. The scenario shows that the most likely and highest value target would be a pipeline, if it were known that the pipeline crossed an international border and that the nations on each side of the border had a history of distrust.

6. The analyst is interested in pipelines as a means of oil transportation for all known refineries and fields in Iran and asks for that information from the CBR for KD system.

7. The CBR for KD system locates a URL concerning the locations of cross border pipelines in the region: http://www.eia.doe.gov/emeu/cabs/iran.html The URL is passed to the Bayesian reasoning system.

8. The Bayesian reasoning system augments the scenario it constructed earlier with the additional information and determines that there is a pipeline that would be at risk.

9. The analyst is alerted to the risk and is presented with the evidence and the scenario showing the reasoning behind the alert.

41 Department of Computer Science and Engineering, University of South

Carolina2005-05-16

Basic Scenario for Capabilities Basic Scenario for Capabilities to Produce Weapon Xto Produce Weapon X

Weapon X Production => Raw Materials Personnel Expertise Funding Manufacturing Facilities Motivation and Intent

Personnel Expertise

Motivation andIntent

ManufacturingFacilities

RawMaterials

Funding

Weapon XProduction