Risk-informed Decision Making under Incomplete Information

Slides:



Advertisements
Similar presentations
S. Ceppi, N. Gatti, and N. Basilico DEI, Politecnico di Milano Computing Bayes-Nash Equilibria through Support Enumeration Methods in Bayesian Two-Player.
Advertisements

Bayesian Belief Propagation
Dependability analysis and evolutionary design optimisation with HiP-HOPS Dr Yiannis Papadopoulos Department of Computer Science University of Hull, U.K.
1 WHY MAKING BAYESIAN NETWORKS BAYESIAN MAKES SENSE. Dawn E. Holmes Department of Statistics and Applied Probability University of California, Santa Barbara.
Risk Modeling The Tropos Approach PhD Lunch Meeting 07/07/2005 Yudistira Asnar –
MS&E 211 Quadratic Programming Ashish Goel. A simple quadratic program Minimize (x 1 ) 2 Subject to: -x 1 + x 2 ≥ 3 -x 1 – x 2 ≥ -2.
Model calibration using. Pag. 5/3/20152 PEST program.
NCSR “DEMOKRITOS” Institute of Nuclear Technology and Radiation Protection NATIONAL TECHNICAL UNIVERSITY OF ATHENS School of Chemical Engineering Fuzzy.
Importance measures in strategic-level supply chain risk management Anssi Käki Ahti Salo Department of Mathematics and Systems Analysis School of Science,
Computing Interval Estimates for Components of Statistical Information with Respect to Judgements on Probability Density Functions Victor G. Krymsky Ufa.
Workshop program ideas and structure Enrico Zio. 2 Agip KCO Introduction to exploration activities 2 Agip KCO Piping and long distance pipelines 2 The.
Decision Making: An Introduction 1. 2 Decision Making Decision Making is a process of choosing among two or more alternative courses of action for the.
1 © 1998 HRL Laboratories, LLC. All Rights Reserved Construction of Bayesian Networks for Diagnostics K. Wojtek Przytula: HRL Laboratories & Don Thompson:
Annex I: Methods & Tools prepared by some members of the ICH Q9 EWG for example only; not an official policy/guidance July 2006, slide 1 ICH Q9 QUALITY.
Torino (Italy) – June 25th, 2013 Ant Colony Optimization for Mapping, Scheduling and Placing in Reconfigurable Systems Christian Pilato Fabrizio Ferrandi,
1 Assessment of Imprecise Reliability Using Efficient Probabilistic Reanalysis Farizal Efstratios Nikolaidis SAE 2007 World Congress.
Eruption Forecasting through the Bayesian Event Tree: the software package BET_EF INGV BET: a probabilistic tool for Eruption Forecasting and Volcanic.
GEODETIC INSTITUTE LEIBNIZ UNIVERSITY OF HANNOVER GERMANY Ingo Neumann and Hansjörg Kutterer The probability of type I and type II errors in imprecise.
Advanced Energy Management in Cloud Computing multi data center environments Giuliana Carello, DEI, Politecnico di Milano Danilo.
Computational Stochastic Optimization: Bridging communities October 25, 2012 Warren Powell CASTLE Laboratory Princeton University
Design Space Exploration
CRESCENDO Full virtuality in design and product development within the extended enterprise Naples, 28 Nov
A Framework for Distributed Model Predictive Control
Software Reliability SEG3202 N. El Kadri.
Helsinki University of Technology Systems Analysis Laboratory Determining cost-effective portfolios of weapon systems Juuso Liesiö, Ahti Salo and Jussi.
Jana Flochová and René K. Boel Faculty of Informatics and Information Technology Slovak university of Technology, Bratislava, Slovakia EESA Department,
9 th Workshop on European Collaboration for Higher Education and Research in Nuclear Engineering & Radiological Protection Salamanca, Spain 5-7 June 2013.
Why Risk Models Should be Parameterised William Marsh, Risk Assessment and Decision Analysis Research Group.
Estimating Component Availability by Dempster-Shafer Belief Networks Estimating Component Availability by Dempster-Shafer Belief Networks Lan Guo Lane.
Calculating Risk of Cost Using Monte Carlo Simulation with Fuzzy Parameters in Civil Engineering Michał Bętkowski Andrzej Pownuk Silesian University of.
Prioritizing Failure Events in Fault Tree Analysis Using Interval-valued Probability Estimates PSAM ’11 and ESREL 2012, Antti Toppila and Ahti.
1 A Comparison of Information Management using Imprecise Probabilities and Precise Bayesian Updating of Reliability Estimates Jason Matthew Aughenbaugh,
Helsinki University of Technology Systems Analysis Laboratory Portfolio and Scenario Analysis in the Cost-Effectiveness Evaluation of Weapon Systems Jussi.
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
Heterogeneous redundancy optimization for multi-state series-parallel systems subject to common cause failures Chun-yang Li, Xun Chen, Xiao-shan Yi, Jun-youg.
11 Ahti Salo, Juuso Liesiö and Eeva Vilkkumaa Department of Mathematics and Systems Analysis Aalto University School of Science and Technology P.O. Box.
DEPARTMENT/SEMESTER ME VII Sem COURSE NAME Operation Research Manav Rachna College of Engg.
DAOmap: A Depth-optimal Area Optimization Mapping Algorithm for FPGA Designs Deming Chen, Jason Cong , Computer Science Department , UCLA Presented.
Spatial Networks Introduction to Spatial Computing CSE 5ISC Some slides adapted from Shashi Shekhar, University of Minnesota.
Distributed cooperation and coordination using the Max-Sum algorithm
1 Helsinki University of Technology Systems Analysis Laboratory Standardization Portfolio Management for a Global Telecom Company Ville Brummer Systems.
Fault Tolerant Routing in Mobile Ad hoc Networks Yuan Xue and Klara Nahrstedt Computer Science Department University of Illinois.
DARSHANA RAGHU MANAGEMENT. Risk Management Risk management is the identification, assessment, and prioritization of risks followed by coordinated and.
A fault tree – Based Bayesian network construction for the failure rate assessment of a complex system 46th ESReDA Seminar May 29-30, 2014, Politecnico.
Tactical techno-economic analysis of electricity generation from forest, fossil, and wood waste fuels in a heating plant: Increasing Use of Renewable Forest.
Prediction of Soil Corrosivity Index: A Bayesian Belief Network Approach Gizachew A. Demissie, PhD student Solomon Tesfamariam,
A Software Cost Model with Reliability Constraint under Two Operational Scenarios Satoru UKIMOTO and Tadashi DOHI Department of Information Engineering,
Adding Dynamic Nodes to Reliability Graph with General Gates using Discrete-Time Method Lab Seminar Mar. 12th, 2007 Seung Ki, Shin.
Edoardo Tosonia,b, Ahti Saloa, Enrico Ziob,c
Innovation- and research programmes at TU Delft Safety and Security Institute (DSyS) June 8th 2017 HSD Cafe Pieter van Gelder.
Fault Trees.
Introduction to Spatial Computing CSE 5ISC
Some tools and a discussion.
Mikko Harju*, Juuso Liesiö**, Kai Virtanen*
Edoardo Tosonia,b, Ahti Saloa, Enrico Ziob,c
Fault Tree Analysis Based on Dynamic Uncertain Causality Graph
Learning to Satisfy Actuator Networks
of Heritage and New Hardware For Launch Vehicle Reliability Models
Quality Risk Management
Evaluating Non-Leak Threats
TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH
A. Mancusoa,b, M. Compareb, A. Saloa, E. Ziob,c
An adversarial risk analysis framework for cybersecurity
A New multi-objective algorithm: Pareto archived dds
Department of Electrical Engineering
M. Vanuzzo, M. Carcassi. Università di Pisa
Machine Learning: Lecture 6
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Machine Learning: UNIT-3 CHAPTER-1
Juuso Liesiö, Pekka Mild and Ahti Salo Systems Analysis Laboratory
Presentation transcript:

Risk-informed Decision Making under Incomplete Information A. Mancusoa,b, M. Compareb, A. Saloa, E. Ziob,c Systems Analysis Laboratory, Department of Mathematics and Systems Analysis - Aalto University Laboratory of Signal and Risk Analysis, Dipartimento di Energia - Politecnico di Milano Chair on Systems Science and the Energetic Challenge - École Centrale Paris and Supelec June 21, 2017

Risk-informed decisions about safety Probabilistic Risk Assessment (PRA) Fault Tree 𝑅𝑅𝑊 𝐺𝑒𝑛 = 𝑃(𝑁𝑜 𝑙𝑖𝑔ℎ𝑡) 𝑃(𝑁𝑜 𝑙𝑖𝑔ℎ𝑡|𝑁𝑜 𝑔𝑒𝑛𝑒𝑟𝑎𝑡𝑜𝑟 𝑓𝑎𝑖𝑙𝑢𝑟𝑒) 𝑅𝑅𝑊 𝐿𝑎𝑚𝑝 = 𝑃(𝑁𝑜 𝑙𝑖𝑔ℎ𝑡) 𝑃(𝑁𝑜 𝑙𝑖𝑔ℎ𝑡|𝑁𝑜 𝑙𝑎𝑚𝑝 𝑓𝑎𝑖𝑙𝑢𝑟𝑒) 𝑅𝑅𝑊 𝑆𝑤𝑖𝑡𝑐ℎ = 𝑃(𝑁𝑜 𝑙𝑖𝑔ℎ𝑡) 𝑃(𝑁𝑜 𝑙𝑖𝑔ℎ𝑡|𝑁𝑜 𝑠𝑤𝑖𝑡𝑐ℎ 𝑓𝑎𝑖𝑙𝑢𝑟𝑒) Concerns Experts choose actions according to these importance measures Cost of actions and feasibility constraints considered only afterwards The results can be sub-optimal

Our methodology The methodology identifies which portfolios of actions minimize the residual risk of the system and the total cost of actions. The methodology accounts for risk, budget and other feasibility constraints. Methodology steps: Step 1: Failure scenario modeling Step 2: Definition of failure probabilities Step 3: Specification of actions Step 4: Optimization model

Step 1: Failure scenario modeling Mapping of Fault Tree (FT) into Bayesian Belief Network (BBN) Advantages Multi-state modeling Extension of concepts of AND/OR gates Reference: Khakzad N., Khan F., Amyotte P., Dynamic safety analysis of process systems by mapping bow-tie into Bayesian network, Process Safety and Environmental Protection 91 (1-2), pp. 46-53 (2013).

Step 2: Definition of failure probabilities Information sources Information provided by AND/OR gates in FT Statistical analyses Expert elicitation The probabilities of events are defined as interval-valued estimates for Initiating events  Failure probabilities of system components Intermediate and top events  Conditional probability tables

Step 3: Specification of actions Parameters of actions: Impact on the prior and conditional probabilities Annualized cost Action 𝑎 for event 𝑋 𝑖 on node 𝑖 modifies the probability of occurrence of state 𝑠. 𝑃 𝑋 𝑎 𝑖 (s) 𝑃 𝑋 𝑖 (s) 𝑃 𝑋 𝑎 𝑖 (s) 𝑃 𝑋 𝑎 𝑖 (s) 𝑠∈ 𝑆 𝑖 𝑠∈ 𝑆 𝑖 To accommodate the imprecise probability into the scenario model we employ credal networks by extending the application of Bayesian networks to credal sets, i.e. sets of probability distributions.

Propagation of imprecise probability Walley (1991) has shown that inference based on a credal set is equivalent to those based only on its extreme points. Thus, the lower and upper total probabilities of occurrence of state 𝑠 for the event 𝑋 𝑖 are 𝑄 𝑋 𝑖 𝑠 = min 𝑧 𝑎 𝑖 ∈ 0,1 𝑥 − 𝑖 ∈ 𝑆 − 𝑖 𝑎∈ 𝐴 𝑖 𝑧 𝑎 𝑖 𝑃 𝑋 𝑎 𝑖 | 𝑥 − 𝑖 (𝑠) 𝑗∈ 𝑉 − 𝑖 𝑄 𝑋 𝑗 ( 𝑥 𝑗 𝑖 ) 𝑄 𝑋 𝑖 𝑠 = max 𝑧 𝑎 𝑖 ∈ 0,1 𝑥 − 𝑖 ∈ 𝑆 − 𝑖 𝑎∈ 𝐴 𝑖 𝑧 𝑎 𝑖 𝑃 𝑋 𝑎 𝑖 | 𝑥 − 𝑖 (𝑠) 𝑗∈ 𝑉 − 𝑖 𝑄 𝑋 𝑗 ( 𝑥 𝑗 𝑖 ) Product accounting for all the conditional proabilities of the states 𝑥 𝑗 𝑖 of the predecessors 𝑗∈ 𝑉 − 𝑖 Summation taken over all possible realizations 𝑥 − 𝑖 ∈ 𝑆 − 𝑖 Reference: Walley P., Statistical reasoning with imprecise probabilities, Chapman and Hall, New York (1991).

Dominance condition 𝑄 𝑋 𝑡 (𝒛) 𝒛 3 𝒛 1 ≻ 𝒛 3 𝒛 1 ⊁ 𝒛 2 𝒛 2 𝒛 2 ⊁ 𝒛 1 𝑄 𝑋 𝑡 (𝒛) 𝒛 3 𝒛 1 ≻ 𝒛 3 𝒛 1 ⊁ 𝒛 2 𝒛 2 𝒛 2 ⊁ 𝒛 1 𝒛 1 Pareto-optimal solutions 𝒛 To identify which portfolios of actions minimize the residual risk of the system, we compute the set of non dominated portfolios, which forms the Pareto optimal frontier.

Step 4: Optimization model Action portfolio #1 Action portfolio #2 Risk acceptability Action portfolio #3 Implicit enumeration algorithm to identify the non-dominated portfolios of safety actions. The resulting portfolios are globally optimal: they minimize the failure risk of target events (instead of selecting actions that target the riskiness of the single components). Action portfolio #4 Action portfolio #5 Budget constraints Action portfolio #6 Action portfolio #7 Select the optimal action portfolio Action portfolio #8 Action feasibility Action portfolio #9 Action portfolio #10 Action portfolio #11 Action portfolio #12

Illustrative example: Accidental gas release The gas release can cause the operator harm if it is not detected or the safety system is not activated. Top event = “Operator harm”. Reference: Mancuso A. et al., “Bayesian approach for safety portfolio optimization”, Risk, Reliability and Safety: Innovating Theory and Practice, pp. 285-292 (2016).

Step 1: Failure scenario modeling Multi-state description of gas release and operator harm. Probability No harm Minor harm Major harm Probability No release Minor release Major release

Step 2 and 3: Definition of failure probabilities Gas release Action C RRR Anti-corrosion paint 𝑎 1 1000 10 −1 Pipe coating 𝑎 2 2500 10 −2 Joined actions 𝑎 3 3000 10 −4 𝑃 𝑋 2 1 𝑠 = 10 −4 ∙ 10 −2 𝑃 𝑋 2 1 𝑠 = 10 −5 ∙ 10 −2 Risk Reduction Rate (RRR)

Step 4: Optimization results Operator harm probability for the optimal portfolio of actions for different budget levels. Bigger budget  more effective actions  lower residual risk of operator harm.

Step 4: Optimization results Pareto-optimal solutions by minimizing “Operator harm” probability in case of no budget constraint. The optimal portfolio characterized by minimal lower bound and upper bound is the fifth solution.

Application of Risk Importance Measures (RIMs) Limitations of using RIMs (such as RRW) They cannot be applied in case of multi-state and multi-objective failure scenarios  they account only a unique target event Actions can be applied to initiating events only  not accounting for synergies of joined actions They do not account for feasibility and budget constraints They do not necessarily lead to the global optimal portfolio of actions because the procedure implies assumptions and expert opinions which strongly affect the decisions at the following iterations

Future research Extend the methodology to support decisions the timing of executing the safety actions Formulate and solve dynamic Defense-in-Depth models in the designing of safety actions (e.g. fire scenarios in a Nuclear Power Plant) Ongoing collaboration with an industrial partner with interests in optimization for occupational safety and other partners in energy field

Thank you for your attention! Alessandro Mancuso System Analysis Laboratory, School of Science, Aalto University, Finland Laboratory of Signal and Risk Analysis, Politecnico di Milano, Italy alessandro.mancuso@aalto.fi